| OVAL Definition Results |
|
|
| ID |
Result |
Class |
Reference ID |
Title |
| oval:com.ubuntu.jammy:def:80191000000 |
true |
patch |
[USN-8019-1], [CVE-2026-1767], [CVE-2026-1764], [CVE-2026-1766], [CVE-2026-1765] |
USN-8019-1 -- tracker-miners vulnerabilities |
| oval:com.ubuntu.jammy:def:80181000000 |
true |
patch |
[USN-8018-1], [CVE-2025-15282], [CVE-2026-0672], [CVE-2026-0865], [CVE-2025-15366], [CVE-2025-15367], [CVE-2025-13837], [CVE-2025-11468], [CVE-2025-12084] |
USN-8018-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:80171000000 |
true |
patch |
[USN-8017-1], [CVE-2026-1484], [CVE-2026-1489], [CVE-2026-1485] |
USN-8017-1 -- GLib vulnerabilities |
| oval:com.ubuntu.jammy:def:80151000000 |
true |
patch |
[USN-8015-1], [CVE-2025-38561], [CVE-2025-39698], [CVE-2025-40019] |
USN-8015-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:80051000000 |
true |
patch |
[USN-8005-1], [CVE-2026-0915], [CVE-2025-8058], [CVE-2025-15281], [CVE-2026-0861] |
USN-8005-1 -- GNU C Library vulnerabilities |
| oval:com.ubuntu.jammy:def:80041000000 |
true |
patch |
[USN-8004-1], [CVE-2026-23531], [CVE-2026-23534], [CVE-2026-23530], [CVE-2026-23533], [CVE-2026-23532] |
USN-8004-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:79911000000 |
true |
patch |
[USN-7991-1], [CVE-2024-9396], [CVE-2024-9397], [CVE-2024-9398], [CVE-2024-9399], [CVE-2024-9400], [CVE-2024-9402], [CVE-2024-9403], [CVE-2024-10460], [CVE-2024-10461], [CVE-2024-10462], [CVE-2024-10464], [CVE-2024-10465], [CVE-2024-10466], [CVE-2024-10467], [CVE-2024-10468], [CVE-2024-50336], [CVE-2025-0237], [CVE-2025-0239], [CVE-2025-0240], [CVE-2025-0241], [CVE-2025-0243], [CVE-2025-0247], [CVE-2025-1018], [CVE-2025-1019], [CVE-2025-1020], [CVE-2025-1942], [CVE-2025-1943], [CVE-2025-3031], [CVE-2025-3032], [CVE-2025-3034], [CVE-2025-4085], [CVE-2025-4088], [CVE-2025-4089], [CVE-2025-4092], [CVE-2025-5270], [CVE-2025-5271], [CVE-2025-5272], [CVE-2025-5283], [CVE-2025-6427], [CVE-2025-6432], [CVE-2025-6433], [CVE-2025-6434], [CVE-2025-6435], [CVE-2025-6436], [CVE-2025-8027], [CVE-2025-8028], [CVE-2025-8029], [CVE-2025-8030], [CVE-2025-8031], [CVE-2025-8032], [CVE-2025-8033], [CVE-2025-8034], [CVE-2025-8035], [CVE-2025-8036], [CVE-2025-8037], [CVE-2025-8038], [CVE-2025-8039], [CVE-2025-8040], [CVE-2025-9179], [CVE-2025-9180], [CVE-2025-9181], [CVE-2025-9182], [CVE-2025-9184], [CVE-2025-9185], [CVE-2025-10527], [CVE-2025-10528], [CVE-2025-10529], [CVE-2025-10532], [CVE-2025-10533], [CVE-2025-10536], [CVE-2025-10537], [CVE-2025-11708], [CVE-2025-11709], [CVE-2025-11710], [CVE-2025-11711], [CVE-2025-11712], [CVE-2025-11713], [CVE-2025-11714], [CVE-2025-11715], [CVE-2025-13012], [CVE-2025-13013], [CVE-2025-13014], [CVE-2025-13015], [CVE-2025-13016], [CVE-2025-13017], [CVE-2025-13018], [CVE-2025-13019], [CVE-2025-13020], [CVE-2025-14321], [CVE-2025-14322], [CVE-2025-14323], [CVE-2025-14324], [CVE-2025-14325], [CVE-2025-14327], [CVE-2025-14328], [CVE-2025-14329], [CVE-2025-14330], [CVE-2025-14331], [CVE-2026-0818], [CVE-2026-0877], [CVE-2026-0878], [CVE-2026-0879], [CVE-2026-0880], [CVE-2026-0882], [CVE-2026-0883], [CVE-2026-0884], [CVE-2026-0885], [CVE-2026-0886], [CVE-2026-0887], [CVE-2026-0890], [CVE-2026-0891] |
USN-7991-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:79851000000 |
true |
patch |
[USN-7985-1], [CVE-2022-24107], [CVE-2022-24106], [CVE-2023-32668], [CVE-2024-25262] |
USN-7985-1 -- TeX Live vulnerabilities |
| oval:com.ubuntu.jammy:def:79821000000 |
true |
patch |
[USN-7982-1], [CVE-2025-59728], [CVE-2025-63757], [CVE-2025-59731], [CVE-2025-59733], [CVE-2025-59732] |
USN-7982-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:79801000000 |
true |
patch |
[USN-7980-1], [CVE-2026-22796], [CVE-2025-68160], [CVE-2025-69418], [CVE-2026-22795], [CVE-2025-66199], [CVE-2025-15468], [CVE-2025-15469], [CVE-2025-15467], [CVE-2025-69421], [CVE-2025-69420], [CVE-2025-69419], [CVE-2025-11187] |
USN-7980-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:79741000000 |
true |
patch |
[USN-7974-1], [CVE-2026-0992], [CVE-2026-0990], [CVE-2025-8732], [CVE-2026-0989] |
USN-7974-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:79711000000 |
true |
patch |
[USN-7971-1], [CVE-2026-0988] |
USN-7971-1 -- GLib vulnerability |
| oval:com.ubuntu.jammy:def:79671000000 |
true |
patch |
[USN-7967-1], [CVE-2025-68276], [CVE-2025-68468], [CVE-2025-68471] |
USN-7967-1 -- Avahi vulnerabilities |
| oval:com.ubuntu.jammy:def:79631000000 |
true |
patch |
[USN-7963-1], [CVE-2026-22695], [CVE-2025-66293], [CVE-2026-22801] |
USN-7963-1 -- libpng vulnerabilities |
| oval:com.ubuntu.jammy:def:79591000000 |
true |
patch |
[USN-7959-1], [CVE-2016-9843] |
USN-7959-1 -- klibc vulnerabilities |
| oval:com.ubuntu.jammy:def:79571000000 |
true |
patch |
[USN-7957-1], [CVE-2025-43531], [CVE-2025-43529], [CVE-2025-14174], [CVE-2025-43501], [CVE-2025-43535], [CVE-2025-43536], [CVE-2025-43541] |
USN-7957-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:79552000000 |
true |
patch |
[USN-7955-2], [CVE-2026-21441] |
USN-7955-2 -- urllib3 regression |
| oval:com.ubuntu.jammy:def:79551000000 |
true |
patch |
[USN-7955-1], [CVE-2026-21441] |
USN-7955-1 -- urllib3 vulnerability |
| oval:com.ubuntu.jammy:def:79541000000 |
true |
patch |
[USN-7954-1], [CVE-2021-46848], [CVE-2025-13151] |
USN-7954-1 -- Libtasn1 vulnerabilities |
| oval:com.ubuntu.jammy:def:79511000000 |
true |
patch |
[USN-7951-1], [CVE-2025-13836] |
USN-7951-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:78301000000 |
true |
patch |
[USN-7830-1], [CVE-2023-6603], [CVE-2023-6605], [CVE-2025-10256], [CVE-2025-7700], [CVE-2025-9951] |
USN-7830-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:78231000000 |
true |
patch |
[USN-7823-1], [CVE-2024-7055], [CVE-2024-35368], [CVE-2024-36613], [CVE-2024-36618], [CVE-2024-35366], [CVE-2024-36619], [CVE-2024-35365], [CVE-2024-36616], [CVE-2024-35367] |
USN-7823-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:77381000000 |
true |
patch |
[USN-7738-1], [CVE-2025-1594] |
USN-7738-1 -- FFmpeg vulnerability |
| oval:com.ubuntu.jammy:def:75581000000 |
true |
patch |
[USN-7558-1], [CVE-2023-50186], [CVE-2024-0444], [CVE-2025-3887] |
USN-7558-1 -- GStreamer Bad Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:75381000000 |
true |
patch |
[USN-7538-1], [CVE-2025-22919], [CVE-2025-0518], [CVE-2025-22921], [CVE-2025-25473], [CVE-2025-1816] |
USN-7538-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:73671000000 |
true |
patch |
[USN-7367-1], [CVE-2025-2173], [CVE-2025-2174], [CVE-2025-2175], [CVE-2025-2176], [CVE-2025-2177] |
USN-7367-1 -- zvbi vulnerabilities |
| oval:com.ubuntu.jammy:def:71881000000 |
true |
patch |
[USN-7188-1], [CVE-2024-36617] |
USN-7188-1 -- FFmpeg vulnerability |
| oval:com.ubuntu.jammy:def:69831000000 |
true |
patch |
[USN-6983-1], [CVE-2024-32230] |
USN-6983-1 -- FFmpeg vulnerability |
| oval:com.ubuntu.jammy:def:68031000000 |
true |
patch |
[USN-6803-1], [CVE-2023-49501], [CVE-2023-49502], [CVE-2023-49528], [CVE-2023-50007], [CVE-2023-50008], [CVE-2023-50009], [CVE-2023-50010], [CVE-2023-51793], [CVE-2023-51794], [CVE-2023-51795], [CVE-2023-51796], [CVE-2023-51798], [CVE-2024-31578], [CVE-2024-31582], [CVE-2024-31585] |
USN-6803-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:64492000000 |
true |
patch |
[USN-6449-2] |
USN-6449-2 -- FFmpeg regression |
| oval:com.ubuntu.jammy:def:64491000000 |
true |
patch |
[USN-6449-1], [CVE-2020-20898], [CVE-2020-22038], [CVE-2021-38090], [CVE-2021-38091], [CVE-2021-38092], [CVE-2021-38093], [CVE-2021-38094], [CVE-2022-48434] |
USN-6449-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:59581000000 |
true |
patch |
[USN-5958-1], [CVE-2022-3109], [CVE-2022-3341], [CVE-2022-3964], [CVE-2022-3965] |
USN-5958-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:100 |
true |
inventory |
|
Check that Ubuntu 22.04 LTS (jammy) is installed. |
| oval:com.ubuntu.jammy:def:991000000 |
false |
patch |
[LSN-0099-1], [CVE-2023-42752], [CVE-2023-3777], [CVE-2023-3609], [CVE-2023-4881], [CVE-2023-42753], [CVE-2023-4623], [CVE-2023-3567], [CVE-2023-3995], [CVE-2023-40283], [CVE-2023-5197], [CVE-2023-3776], [CVE-2023-4622], [CVE-2023-4004], [CVE-2023-34319], [CVE-2022-3643], [CVE-2023-31436] |
LSN-0099-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:981000000 |
false |
patch |
[LSN-0098-1], [CVE-2023-3776], [CVE-2023-3609], [CVE-2023-21400], [CVE-2023-4004], [CVE-2023-3777], [CVE-2023-40283], [CVE-2023-3090], [CVE-2023-3995], [CVE-2023-3567], [CVE-2023-4128] |
LSN-0098-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:971000000 |
false |
patch |
[LSN-0097-1], [CVE-2023-31248], [CVE-2023-32629], [CVE-2023-3090], [CVE-2023-3390], [CVE-2023-35788], [CVE-2023-35001], [CVE-2023-3389] |
LSN-0097-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:961000000 |
false |
patch |
[LSN-0096-1], [CVE-2023-31436], [CVE-2023-35001], [CVE-2023-30456], [CVE-2023-31248], [CVE-2023-1380] |
LSN-0096-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:951000000 |
false |
patch |
[LSN-0095-1], [CVE-2023-32233], [CVE-2023-2612], [CVE-2023-0386], [CVE-2023-1872], [CVE-2023-1380], [CVE-2023-31436] |
LSN-0095-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:941000000 |
false |
patch |
[LSN-0094-1], [CVE-2023-1281], [CVE-2023-0468] |
LSN-0094-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:931000000 |
false |
patch |
[LSN-0093-1], [CVE-2023-0461], [CVE-2023-0179] |
LSN-0093-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:921000000 |
false |
patch |
[LSN-0092-1], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-43945] |
LSN-0092-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:911000000 |
false |
patch |
[LSN-0091-1], [CVE-2022-42719], [CVE-2022-41222] |
LSN-0091-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:901000000 |
false |
patch |
[LSN-0090-1], [CVE-2022-42720], [CVE-2022-1015], [CVE-2022-41674], [CVE-2022-42722], [CVE-2022-2602], [CVE-2022-42721] |
LSN-0090-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:891000000 |
false |
patch |
[LSN-0089-1], [CVE-2022-2586], [CVE-2022-2585], [CVE-2022-1972], [CVE-2022-29581], [CVE-2022-2588], [CVE-2022-34918], [CVE-2022-21499], [CVE-2022-1966] |
LSN-0089-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:871000000 |
false |
patch |
[LSN-0087-1], [CVE-2022-1972], [CVE-2022-1966] |
LSN-0087-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:861000000 |
false |
patch |
[LSN-0086-1], [CVE-2022-1055], [CVE-2022-0492], [CVE-2022-30594], [CVE-2022-1116], [CVE-2022-21499], [CVE-2021-39713], [CVE-2022-29581] |
LSN-0086-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:80161000000 |
false |
patch |
[USN-8016-1], [CVE-2025-38561], [CVE-2025-39698], [CVE-2025-40019], [CVE-2025-68746] |
USN-8016-1 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:80152000000 |
false |
patch |
[USN-8015-2], [CVE-2025-38561], [CVE-2025-39698], [CVE-2025-40019] |
USN-8015-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:80133000000 |
false |
patch |
[USN-8013-3], [CVE-2025-38561], [CVE-2025-40019] |
USN-8013-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:80132000000 |
false |
patch |
[USN-8013-2], [CVE-2025-38561], [CVE-2025-40019] |
USN-8013-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:80131000000 |
false |
patch |
[USN-8013-1], [CVE-2025-38561], [CVE-2025-40019] |
USN-8013-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:80111000000 |
false |
patch |
[USN-8011-1], [CVE-2025-1244], [CVE-2024-53920] |
USN-8011-1 -- Emacs vulnerabilities |
| oval:com.ubuntu.jammy:def:80091000000 |
false |
patch |
[USN-8009-1], [CVE-2026-1312], [CVE-2025-13473], [CVE-2026-1287], [CVE-2025-14550], [CVE-2026-1285], [CVE-2026-1207] |
USN-8009-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:80071000000 |
false |
patch |
[USN-8007-1], [CVE-2025-69204], [CVE-2025-68618], [CVE-2025-43965] |
USN-8007-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:80021000000 |
false |
patch |
[USN-8002-1], [CVE-2026-21945], [CVE-2026-21933], [CVE-2026-21932], [CVE-2026-21925] |
USN-8002-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:80011000000 |
false |
patch |
[USN-8001-1], [CVE-2026-21933], [CVE-2026-21932], [CVE-2026-21945], [CVE-2026-21925] |
USN-8001-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:80001000000 |
false |
patch |
[USN-8000-1], [CVE-2026-21932], [CVE-2026-21925], [CVE-2026-21933], [CVE-2026-21945] |
USN-8000-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:79991000000 |
false |
patch |
[USN-7999-1], [CVE-2025-68146], [CVE-2026-22701] |
USN-7999-1 -- Filelock vulnerabilities |
| oval:com.ubuntu.jammy:def:79981000000 |
false |
patch |
[USN-7998-1], [CVE-2026-21932], [CVE-2026-21933], [CVE-2026-21925], [CVE-2026-21945] |
USN-7998-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:79951000000 |
false |
patch |
[USN-7995-1], [CVE-2026-21925], [CVE-2026-21932], [CVE-2026-21933], [CVE-2026-21945] |
USN-7995-1 -- OpenJDK 25 vulnerabilities |
| oval:com.ubuntu.jammy:def:79941000000 |
false |
patch |
[USN-7994-1], [CVE-2026-21937], [CVE-2026-21948], [CVE-2026-21968], [CVE-2026-21941], [CVE-2026-21936], [CVE-2026-21964] |
USN-7994-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:79921000000 |
false |
patch |
[USN-7992-1], [CVE-2026-24061] |
USN-7992-1 -- Inetutils vulnerability |
| oval:com.ubuntu.jammy:def:79891000000 |
false |
patch |
[USN-7989-1], [CVE-2025-58438] |
USN-7989-1 -- The Internet Archive Python Library vulnerability |
| oval:com.ubuntu.jammy:def:79841000000 |
false |
patch |
[USN-7984-1], [CVE-2024-47516], [CVE-2024-4982], [CVE-2024-4981], [CVE-2024-47515] |
USN-7984-1 -- Pagure vulnerabilities |
| oval:com.ubuntu.jammy:def:79831000000 |
false |
patch |
[USN-7983-1], [CVE-2025-64329], [CVE-2024-25621] |
USN-7983-1 -- containerd vulnerabilities |
| oval:com.ubuntu.jammy:def:79811000000 |
false |
patch |
[USN-7981-1], [CVE-2026-22251], [CVE-2026-22250] |
USN-7981-1 -- wlc vulnerabilities |
| oval:com.ubuntu.jammy:def:79781000000 |
false |
patch |
[USN-7978-1], [CVE-2025-46802], [CVE-2025-46804], [CVE-2025-46805], [CVE-2023-24626] |
USN-7978-1 -- GNU Screen vulnerabilities |
| oval:com.ubuntu.jammy:def:79771000000 |
false |
patch |
[USN-7977-1], [CVE-2024-53263], [CVE-2025-26625] |
USN-7977-1 -- Git LFS vulnerabilities |
| oval:com.ubuntu.jammy:def:79761000000 |
false |
patch |
[USN-7976-1], [CVE-2025-7783] |
USN-7976-1 -- Form-Data vulnerability |
| oval:com.ubuntu.jammy:def:79751000000 |
false |
patch |
[USN-7975-1], [CVE-2026-23490] |
USN-7975-1 -- pyasn1 vulnerability |
| oval:com.ubuntu.jammy:def:79731000000 |
false |
patch |
[USN-7973-1], [CVE-2023-53154], [CVE-2025-57052], [CVE-2023-26819] |
USN-7973-1 -- cJSON vulnerabilities |
| oval:com.ubuntu.jammy:def:79721000000 |
false |
patch |
[USN-7972-1], [CVE-2025-15536] |
USN-7972-1 -- OpenCC vulnerability |
| oval:com.ubuntu.jammy:def:79701000000 |
false |
patch |
[USN-7970-1], [CVE-2025-54349], [CVE-2025-54350], [CVE-2023-7250], [CVE-2024-53580], [CVE-2024-26306] |
USN-7970-1 -- iperf3 vulnerabilities |
| oval:com.ubuntu.jammy:def:79681000000 |
false |
patch |
[USN-7968-1], [CVE-2025-55753], [CVE-2025-65082], [CVE-2025-58098], [CVE-2025-66200] |
USN-7968-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:79662000000 |
false |
patch |
[USN-7966-2], [CVE-2022-29222], [CVE-2022-29189], [CVE-2022-29190] |
USN-7966-2 -- Telegraf vulnerabilities |
| oval:com.ubuntu.jammy:def:79661000000 |
false |
patch |
[USN-7966-1], [CVE-2022-29189], [CVE-2022-29222], [CVE-2022-29190] |
USN-7966-1 -- Snowflake vulnerabilities |
| oval:com.ubuntu.jammy:def:79651000000 |
false |
patch |
[USN-7965-1], [CVE-2025-0781] |
USN-7965-1 -- SimGear vulnerability |
| oval:com.ubuntu.jammy:def:79621000000 |
false |
patch |
[USN-7962-1], [CVE-2025-66570] |
USN-7962-1 -- cpp-httplib vulnerability |
| oval:com.ubuntu.jammy:def:79601000000 |
false |
patch |
[USN-7960-1], [CVE-2025-61770], [CVE-2025-59830], [CVE-2025-61771], [CVE-2025-61772], [CVE-2025-61919], [CVE-2025-61780] |
USN-7960-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:79581000000 |
false |
patch |
[USN-7958-1], [CVE-2024-8372], [CVE-2019-14863], [CVE-2025-0716], [CVE-2023-26117], [CVE-2024-8373], [CVE-2025-2336], [CVE-2024-21490], [CVE-2023-26116], [CVE-2023-26118], [CVE-2022-25844] |
USN-7958-1 -- AngularJS vulnerabilities |
| oval:com.ubuntu.jammy:def:79561000000 |
false |
patch |
[USN-7956-1], [CVE-2025-58181] |
USN-7956-1 -- Google Guest Agent vulnerability |
| oval:com.ubuntu.jammy:def:79531000000 |
false |
patch |
[USN-7953-1], [CVE-2025-14178], [CVE-2025-14180], [CVE-2025-14177] |
USN-7953-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:79521000000 |
false |
patch |
[USN-7952-1], [CVE-2024-25269], [CVE-2025-68431] |
USN-7952-1 -- libheif vulnerabilities |
| oval:com.ubuntu.jammy:def:79501000000 |
false |
patch |
[USN-7950-1], [CVE-2025-67724], [CVE-2025-67725], [CVE-2025-67726] |
USN-7950-1 -- Tornado vulnerabilities |
| oval:com.ubuntu.jammy:def:79491000000 |
false |
patch |
[USN-7949-1], [CVE-2025-69277] |
USN-7949-1 -- Sodium vulnerability |
| oval:com.ubuntu.jammy:def:79481000000 |
false |
patch |
[USN-7948-1], [CVE-2025-67268], [CVE-2025-67269] |
USN-7948-1 -- GPSd vulnerabilities |
| oval:com.ubuntu.jammy:def:79461000000 |
false |
patch |
[USN-7946-1], [CVE-2025-68973] |
USN-7946-1 -- GnuPG vulnerability |
| oval:com.ubuntu.jammy:def:79451000000 |
false |
patch |
[USN-7945-1], [CVE-2025-7424] |
USN-7945-1 -- Libxslt vulnerability |
| oval:com.ubuntu.jammy:def:79441000000 |
false |
patch |
[USN-7944-1], [CVE-2025-68615] |
USN-7944-1 -- Net-SNMP vulnerability |
| oval:com.ubuntu.jammy:def:79431000000 |
false |
patch |
[USN-7943-1], [CVE-2022-0856] |
USN-7943-1 -- libcaca vulnerability |
| oval:com.ubuntu.jammy:def:79421000000 |
false |
patch |
[USN-7942-1], [CVE-2025-3360], [CVE-2025-6052], [CVE-2025-7039], [CVE-2025-13601], [CVE-2025-14087] |
USN-7942-1 -- GLib vulnerabilities |
| oval:com.ubuntu.jammy:def:79411000000 |
false |
patch |
[USN-7941-1], [CVE-2025-66287], [CVE-2025-43458], [CVE-2025-43421], [CVE-2025-13947] |
USN-7941-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:79351000000 |
false |
patch |
[USN-7935-1], [CVE-2025-21729], [CVE-2025-37838], [CVE-2025-37958], [CVE-2025-38118], [CVE-2025-38227], [CVE-2025-38352], [CVE-2025-38616], [CVE-2025-38666], [CVE-2025-38678], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018], [CVE-2025-40300] |
USN-7935-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:79331000000 |
false |
patch |
[USN-7933-1], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52593], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-26700], [CVE-2024-26896], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38477], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38617], [CVE-2025-38618], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38727], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920], [CVE-2025-40300] |
USN-7933-1 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:79321000000 |
false |
patch |
[USN-7932-1], [CVE-2025-12105] |
USN-7932-1 -- libsoup vulnerability |
| oval:com.ubuntu.jammy:def:79313000000 |
false |
patch |
[USN-7931-3], [CVE-2025-37958], [CVE-2025-38666], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7931-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:79311000000 |
false |
patch |
[USN-7931-1], [CVE-2025-37958], [CVE-2025-38666], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7931-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:79291000000 |
false |
patch |
[USN-7929-1], [CVE-2025-66004] |
USN-7929-1 -- usbmuxd vulnerability |
| oval:com.ubuntu.jammy:def:79285000000 |
false |
patch |
[USN-7928-5], [CVE-2022-49390], [CVE-2024-47691], [CVE-2024-50067], [CVE-2024-53090], [CVE-2024-53218], [CVE-2025-21855], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7928-5 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:79284000000 |
false |
patch |
[USN-7928-4], [CVE-2022-49390], [CVE-2024-47691], [CVE-2024-50067], [CVE-2024-53090], [CVE-2024-53218], [CVE-2025-21855], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7928-4 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:79283000000 |
false |
patch |
[USN-7928-3], [CVE-2022-49390], [CVE-2024-47691], [CVE-2024-50067], [CVE-2024-53090], [CVE-2024-53218], [CVE-2025-21855], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7928-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:79282000000 |
false |
patch |
[USN-7928-2], [CVE-2022-49390], [CVE-2024-47691], [CVE-2024-50067], [CVE-2024-53090], [CVE-2024-53218], [CVE-2025-21855], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7928-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:79281000000 |
false |
patch |
[USN-7928-1], [CVE-2022-49390], [CVE-2024-47691], [CVE-2024-50067], [CVE-2024-53090], [CVE-2024-53218], [CVE-2025-21855], [CVE-2025-39964], [CVE-2025-39993], [CVE-2025-40018] |
USN-7928-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:79271000000 |
false |
patch |
[USN-7927-1], [CVE-2025-66418], [CVE-2025-66471] |
USN-7927-1 -- urllib3 vulnerabilities |
| oval:com.ubuntu.jammy:def:79261000000 |
false |
patch |
[USN-7926-1], [CVE-2025-65073], [CVE-2021-3563], [CVE-2022-2447] |
USN-7926-1 -- OpenStack Keystone vulnerabilities |
| oval:com.ubuntu.jammy:def:79241000000 |
false |
patch |
[USN-7924-1], [CVE-2025-64720], [CVE-2025-64506], [CVE-2025-64505], [CVE-2025-65018] |
USN-7924-1 -- libpng vulnerabilities |
| oval:com.ubuntu.jammy:def:79231000000 |
false |
patch |
[USN-7923-1], [CVE-2024-25580] |
USN-7923-1 -- Qt vulnerability |
| oval:com.ubuntu.jammy:def:79191000000 |
false |
patch |
[USN-7919-1], [CVE-2025-11495], [CVE-2025-11081], [CVE-2025-11083], [CVE-2025-11412], [CVE-2025-11082], [CVE-2025-11413], [CVE-2025-11414], [CVE-2025-11494] |
USN-7919-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:79181000000 |
false |
patch |
[USN-7918-1], [CVE-2025-58057], [CVE-2025-58056] |
USN-7918-1 -- Netty vulnerabilities |
| oval:com.ubuntu.jammy:def:79171000000 |
false |
patch |
[USN-7917-1], [CVE-2025-66034], [CVE-2023-45139] |
USN-7917-1 -- fontTools vulnerabilities |
| oval:com.ubuntu.jammy:def:79161000000 |
false |
patch |
[USN-7916-1], [CVE-2025-6966] |
USN-7916-1 -- python-apt vulnerability |
| oval:com.ubuntu.jammy:def:79141000000 |
false |
patch |
[USN-7914-1], [CVE-2025-43434], [CVE-2025-43392], [CVE-2025-43425], [CVE-2025-43429], [CVE-2025-43427], [CVE-2025-43431], [CVE-2025-43443], [CVE-2025-43440], [CVE-2025-43430], [CVE-2025-43432] |
USN-7914-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:79131000000 |
false |
patch |
[USN-7913-1], [CVE-2022-34300], [CVE-2018-16981], [CVE-2021-46143] |
USN-7913-1 -- MAME vulnerabilities |
| oval:com.ubuntu.jammy:def:79121000000 |
false |
patch |
[USN-7912-1], [CVE-2025-58436] |
USN-7912-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:79102000000 |
false |
patch |
[USN-7910-2], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920], [CVE-2025-40300] |
USN-7910-2 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:79101000000 |
false |
patch |
[USN-7910-1], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920], [CVE-2025-40300] |
USN-7910-1 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:79095000000 |
false |
patch |
[USN-7909-5], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920] |
USN-7909-5 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:79094000000 |
false |
patch |
[USN-7909-4], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920] |
USN-7909-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:79093000000 |
false |
patch |
[USN-7909-3], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920] |
USN-7909-3 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:79092000000 |
false |
patch |
[USN-7909-2], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920] |
USN-7909-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:79091000000 |
false |
patch |
[USN-7909-1], [CVE-2022-50070], [CVE-2022-50327], [CVE-2023-52935], [CVE-2023-53074], [CVE-2024-50061], [CVE-2024-53068], [CVE-2025-37925], [CVE-2025-37968], [CVE-2025-38095], [CVE-2025-38148], [CVE-2025-38165], [CVE-2025-38335], [CVE-2025-38347], [CVE-2025-38468], [CVE-2025-38470], [CVE-2025-38473], [CVE-2025-38474], [CVE-2025-38476], [CVE-2025-38478], [CVE-2025-38480], [CVE-2025-38481], [CVE-2025-38482], [CVE-2025-38483], [CVE-2025-38487], [CVE-2025-38488], [CVE-2025-38494], [CVE-2025-38495], [CVE-2025-38497], [CVE-2025-38499], [CVE-2025-38502], [CVE-2025-38527], [CVE-2025-38528], [CVE-2025-38529], [CVE-2025-38530], [CVE-2025-38535], [CVE-2025-38538], [CVE-2025-38539], [CVE-2025-38548], [CVE-2025-38550], [CVE-2025-38553], [CVE-2025-38555], [CVE-2025-38563], [CVE-2025-38565], [CVE-2025-38569], [CVE-2025-38572], [CVE-2025-38574], [CVE-2025-38576], [CVE-2025-38577], [CVE-2025-38578], [CVE-2025-38579], [CVE-2025-38581], [CVE-2025-38583], [CVE-2025-38601], [CVE-2025-38602], [CVE-2025-38604], [CVE-2025-38608], [CVE-2025-38609], [CVE-2025-38612], [CVE-2025-38614], [CVE-2025-38622], [CVE-2025-38623], [CVE-2025-38624], [CVE-2025-38630], [CVE-2025-38634], [CVE-2025-38635], [CVE-2025-38639], [CVE-2025-38645], [CVE-2025-38650], [CVE-2025-38652], [CVE-2025-38663], [CVE-2025-38664], [CVE-2025-38666], [CVE-2025-38668], [CVE-2025-38670], [CVE-2025-38671], [CVE-2025-38676], [CVE-2025-38677], [CVE-2025-38678], [CVE-2025-38680], [CVE-2025-38681], [CVE-2025-38683], [CVE-2025-38684], [CVE-2025-38685], [CVE-2025-38687], [CVE-2025-38691], [CVE-2025-38693], [CVE-2025-38694], [CVE-2025-38695], [CVE-2025-38696], [CVE-2025-38697], [CVE-2025-38698], [CVE-2025-38699], [CVE-2025-38700], [CVE-2025-38701], [CVE-2025-38706], [CVE-2025-38707], [CVE-2025-38708], [CVE-2025-38711], [CVE-2025-38712], [CVE-2025-38713], [CVE-2025-38714], [CVE-2025-38715], [CVE-2025-38718], [CVE-2025-38721], [CVE-2025-38724], [CVE-2025-38725], [CVE-2025-38729], [CVE-2025-38732], [CVE-2025-39673], [CVE-2025-39675], [CVE-2025-39676], [CVE-2025-39681], [CVE-2025-39683], [CVE-2025-39684], [CVE-2025-39685], [CVE-2025-39686], [CVE-2025-39687], [CVE-2025-39689], [CVE-2025-39691], [CVE-2025-39693], [CVE-2025-39697], [CVE-2025-39702], [CVE-2025-39703], [CVE-2025-39709], [CVE-2025-39710], [CVE-2025-39713], [CVE-2025-39714], [CVE-2025-39724], [CVE-2025-39730], [CVE-2025-39734], [CVE-2025-39736], [CVE-2025-39737], [CVE-2025-39738], [CVE-2025-39742], [CVE-2025-39743], [CVE-2025-39749], [CVE-2025-39752], [CVE-2025-39756], [CVE-2025-39757], [CVE-2025-39760], [CVE-2025-39766], [CVE-2025-39772], [CVE-2025-39773], [CVE-2025-39776], [CVE-2025-39782], [CVE-2025-39783], [CVE-2025-39787], [CVE-2025-39788], [CVE-2025-39790], [CVE-2025-39794], [CVE-2025-39795], [CVE-2025-39798], [CVE-2025-39801], [CVE-2025-39806], [CVE-2025-39808], [CVE-2025-39812], [CVE-2025-39813], [CVE-2025-39817], [CVE-2025-39823], [CVE-2025-39824], [CVE-2025-39828], [CVE-2025-39835], [CVE-2025-39839], [CVE-2025-39841], [CVE-2025-39844], [CVE-2025-39845], [CVE-2025-39846], [CVE-2025-39847], [CVE-2025-39848], [CVE-2025-39853], [CVE-2025-39860], [CVE-2025-39864], [CVE-2025-39865], [CVE-2025-39866], [CVE-2025-39891], [CVE-2025-39894], [CVE-2025-39902], [CVE-2025-39920] |
USN-7909-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:79081000000 |
false |
patch |
[USN-7908-1], [CVE-2025-12817], [CVE-2025-12818] |
USN-7908-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:79031000000 |
false |
patch |
[USN-7903-1], [CVE-2025-13372], [CVE-2025-64460] |
USN-7903-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:78991000000 |
false |
patch |
[USN-7899-1], [CVE-2025-3198], [CVE-2025-1182], [CVE-2025-1153], [CVE-2025-7545], [CVE-2025-0840], [CVE-2025-5244], [CVE-2025-5245], [CVE-2025-8225], [CVE-2025-1181], [CVE-2025-11839], [CVE-2025-11840] |
USN-7899-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:78971000000 |
false |
patch |
[USN-7897-1], [CVE-2025-61915] |
USN-7897-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:78951000000 |
false |
patch |
[USN-7895-1], [CVE-2025-43343] |
USN-7895-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:78942000000 |
false |
patch |
[USN-7894-2] |
USN-7894-2 -- EDK II regression |
| oval:com.ubuntu.jammy:def:78941000000 |
false |
patch |
[USN-7894-1], [CVE-2024-9143], [CVE-2024-4741], [CVE-2023-0464], [CVE-2024-6119], [CVE-2024-13176], [CVE-2023-2650], [CVE-2024-0727], [CVE-2025-2295], [CVE-2021-3712], [CVE-2023-0215], [CVE-2022-4304], [CVE-2023-0466], [CVE-2023-45237], [CVE-2023-0286], [CVE-2022-4450], [CVE-2024-2511], [CVE-2024-38796], [CVE-2025-3770], [CVE-2023-6237], [CVE-2023-0465], [CVE-2023-3817], [CVE-2024-5535], [CVE-2023-5678], [CVE-2025-9232], [CVE-2022-0778], [CVE-2024-38805], [CVE-2024-38797], [CVE-2023-3446], [CVE-2024-1298], [CVE-2023-45236] |
USN-7894-1 -- EDK II vulnerabilities |
| oval:com.ubuntu.jammy:def:78921000000 |
false |
patch |
[USN-7892-1], [CVE-2023-44487] |
USN-7892-1 -- H2O vulnerability |
| oval:com.ubuntu.jammy:def:78911000000 |
false |
patch |
[USN-7891-1], [CVE-2023-53159], [CVE-2025-3416], [CVE-2025-24898] |
USN-7891-1 -- rust-openssl vulnerabilities |
| oval:com.ubuntu.jammy:def:78896000000 |
false |
patch |
[USN-7889-6], [CVE-2025-21729], [CVE-2025-38227], [CVE-2025-38616], [CVE-2025-38678] |
USN-7889-6 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78895000000 |
false |
patch |
[USN-7889-5], [CVE-2025-21729], [CVE-2025-38227], [CVE-2025-38616], [CVE-2025-38678] |
USN-7889-5 -- Linux kernel (IBM) vulnerabilities |
| oval:com.ubuntu.jammy:def:78894000000 |
false |
patch |
[USN-7889-4], [CVE-2025-21729], [CVE-2025-38227], [CVE-2025-38616], [CVE-2025-38678] |
USN-7889-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78893000000 |
false |
patch |
[USN-7889-3], [CVE-2025-21729], [CVE-2025-38227], [CVE-2025-38616], [CVE-2025-38678] |
USN-7889-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:78891000000 |
false |
patch |
[USN-7889-1], [CVE-2025-21729], [CVE-2025-38227], [CVE-2025-38616], [CVE-2025-38678] |
USN-7889-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78881000000 |
false |
patch |
[USN-7888-1], [CVE-2023-51106], [CVE-2023-51103], [CVE-2024-46657], [CVE-2025-46206], [CVE-2023-51104], [CVE-2023-51105] |
USN-7888-1 -- MuPDF vulnerabilities |
| oval:com.ubuntu.jammy:def:78861000000 |
false |
patch |
[USN-7886-1], [CVE-2025-8291], [CVE-2025-6075] |
USN-7886-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:78851000000 |
false |
patch |
[USN-7885-1], [CVE-2025-53057], [CVE-2025-53066], [CVE-2025-61748] |
USN-7885-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:78841000000 |
false |
patch |
[USN-7884-1], [CVE-2025-61748], [CVE-2025-53057], [CVE-2025-53066] |
USN-7884-1 -- OpenJDK 25 vulnerabilities |
| oval:com.ubuntu.jammy:def:78831000000 |
false |
patch |
[USN-7883-1], [CVE-2025-53057], [CVE-2025-53066] |
USN-7883-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:78821000000 |
false |
patch |
[USN-7882-1], [CVE-2025-53066], [CVE-2025-53057] |
USN-7882-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:78811000000 |
false |
patch |
[USN-7881-1], [CVE-2025-53057], [CVE-2025-53066] |
USN-7881-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:78781000000 |
false |
patch |
[USN-7878-1], [CVE-2025-64503], [CVE-2025-57812], [CVE-2025-64524] |
USN-7878-1 -- cups-filters vulnerabilities |
| oval:com.ubuntu.jammy:def:78761000000 |
false |
patch |
[USN-7876-1], [CVE-2025-62171] |
USN-7876-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:78731000000 |
false |
patch |
[USN-7873-1], [CVE-2025-53054], [CVE-2025-53040], [CVE-2025-53069], [CVE-2025-53044], [CVE-2025-53042], [CVE-2025-53062], [CVE-2025-53053], [CVE-2025-53045] |
USN-7873-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:78721000000 |
false |
patch |
[USN-7872-1], [CVE-2025-46784], [CVE-2025-46705], [CVE-2025-47151], [CVE-2025-46404] |
USN-7872-1 -- Lasso vulnerabilities |
| oval:com.ubuntu.jammy:def:78701000000 |
false |
patch |
[USN-7870-1], [CVE-2024-24258], [CVE-2024-24259] |
USN-7870-1 -- Freeglut vulnerabilities |
| oval:com.ubuntu.jammy:def:78661000000 |
false |
patch |
[USN-7866-1], [CVE-2025-20053], [CVE-2025-22839], [CVE-2025-22840], [CVE-2025-20109], [CVE-2025-24305], [CVE-2025-26403], [CVE-2025-21090], [CVE-2025-32086], [CVE-2025-22889] |
USN-7866-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:78641000000 |
false |
patch |
[USN-7864-1], [CVE-2025-37838], [CVE-2025-38118], [CVE-2025-38352], [CVE-2025-38425], [CVE-2025-40300] |
USN-7864-1 -- Linux kernel (GCP and GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:78623000000 |
false |
patch |
[USN-7862-3], [CVE-2025-40300] |
USN-7862-3 -- Linux kernel (Xilinx ZynqMP) vulnerability |
| oval:com.ubuntu.jammy:def:78622000000 |
false |
patch |
[USN-7862-2], [CVE-2025-40300] |
USN-7862-2 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:78621000000 |
false |
patch |
[USN-7862-1], [CVE-2025-40300] |
USN-7862-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:78614000000 |
false |
patch |
[USN-7861-4], [CVE-2025-37838], [CVE-2025-38118], [CVE-2025-38352], [CVE-2025-40300] |
USN-7861-4 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:78613000000 |
false |
patch |
[USN-7861-3], [CVE-2025-37838], [CVE-2025-38118], [CVE-2025-38352], [CVE-2025-40300] |
USN-7861-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78612000000 |
false |
patch |
[USN-7861-2], [CVE-2025-37838], [CVE-2025-38118], [CVE-2025-38352], [CVE-2025-40300] |
USN-7861-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:78611000000 |
false |
patch |
[USN-7861-1], [CVE-2025-37838], [CVE-2025-38118], [CVE-2025-38352], [CVE-2025-40300] |
USN-7861-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78604000000 |
false |
patch |
[USN-7860-4], [CVE-2025-40300] |
USN-7860-4 -- Linux kernel (Real-time) vulnerability |
| oval:com.ubuntu.jammy:def:78603000000 |
false |
patch |
[USN-7860-3], [CVE-2025-40300] |
USN-7860-3 -- Linux kernel (FIPS) vulnerability |
| oval:com.ubuntu.jammy:def:78591000000 |
false |
patch |
[USN-7859-1], [CVE-2025-64459] |
USN-7859-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:78581000000 |
false |
patch |
[USN-7858-1], [CVE-2025-52885] |
USN-7858-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:78552000000 |
false |
patch |
[USN-7855-2], [CVE-2025-11411] |
USN-7855-2 -- Unbound regression |
| oval:com.ubuntu.jammy:def:78551000000 |
false |
patch |
[USN-7855-1], [CVE-2025-11411] |
USN-7855-1 -- Unbound vulnerability |
| oval:com.ubuntu.jammy:def:78521000000 |
false |
patch |
[USN-7852-1], [CVE-2025-7425] |
USN-7852-1 -- libxml2 vulnerability |
| oval:com.ubuntu.jammy:def:78512000000 |
false |
patch |
[USN-7851-2] |
USN-7851-2 -- runC regression |
| oval:com.ubuntu.jammy:def:78511000000 |
false |
patch |
[USN-7851-1], [CVE-2025-31133], [CVE-2025-52565], [CVE-2025-52881] |
USN-7851-1 -- runC vulnerabilities |
| oval:com.ubuntu.jammy:def:78491000000 |
false |
patch |
[USN-7849-1], [CVE-2025-8114] |
USN-7849-1 -- libssh vulnerability |
| oval:com.ubuntu.jammy:def:78471000000 |
false |
patch |
[USN-7847-1], [CVE-2025-11082], [CVE-2025-11083], [CVE-2025-1147], [CVE-2025-1148], [CVE-2025-1182], [CVE-2025-3198], [CVE-2025-5244], [CVE-2025-5245], [CVE-2025-7545], [CVE-2025-7546], [CVE-2025-8225] |
USN-7847-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:78461000000 |
false |
patch |
[USN-7846-1], [CVE-2025-62230], [CVE-2025-62231], [CVE-2025-62229] |
USN-7846-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:78451000000 |
false |
patch |
[USN-7845-1], [CVE-2025-62168] |
USN-7845-1 -- Squid vulnerability |
| oval:com.ubuntu.jammy:def:78441000000 |
false |
patch |
[USN-7844-1], [CVE-2025-11683] |
USN-7844-1 -- YAML::Syck vulnerability |
| oval:com.ubuntu.jammy:def:78431000000 |
false |
patch |
[USN-7843-1], [CVE-2025-59419] |
USN-7843-1 -- Netty vulnerability |
| oval:com.ubuntu.jammy:def:78411000000 |
false |
patch |
[USN-7841-1], [CVE-2025-62291] |
USN-7841-1 -- strongSwan vulnerability |
| oval:com.ubuntu.jammy:def:78392000000 |
false |
patch |
[USN-7839-2], [CVE-2024-45337] |
USN-7839-2 -- Google Guest Agent vulnerability |
| oval:com.ubuntu.jammy:def:78391000000 |
false |
patch |
[USN-7839-1], [CVE-2024-45337] |
USN-7839-1 -- Go Cryptography vulnerability |
| oval:com.ubuntu.jammy:def:78381000000 |
false |
patch |
[USN-7838-1], [CVE-2025-61962] |
USN-7838-1 -- fetchmail vulnerability |
| oval:com.ubuntu.jammy:def:78361000000 |
false |
patch |
[USN-7836-1], [CVE-2025-40778], [CVE-2025-8677], [CVE-2025-40780] |
USN-7836-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:78356000000 |
false |
patch |
[USN-7835-6], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-6 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:78355000000 |
false |
patch |
[USN-7835-5], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-5 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:78354000000 |
false |
patch |
[USN-7835-4], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-4 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:78353000000 |
false |
patch |
[USN-7835-3], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78352000000 |
false |
patch |
[USN-7835-2], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:78351000000 |
false |
patch |
[USN-7835-1], [CVE-2023-53034], [CVE-2024-58092], [CVE-2025-22018], [CVE-2025-22019], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22027], [CVE-2025-22028], [CVE-2025-22033], [CVE-2025-22035], [CVE-2025-22036], [CVE-2025-22038], [CVE-2025-22039], [CVE-2025-22040], [CVE-2025-22041], [CVE-2025-22042], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22047], [CVE-2025-22050], [CVE-2025-22053], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22057], [CVE-2025-22058], [CVE-2025-22060], [CVE-2025-22062], [CVE-2025-22063], [CVE-2025-22064], [CVE-2025-22065], [CVE-2025-22066], [CVE-2025-22068], [CVE-2025-22070], [CVE-2025-22071], [CVE-2025-22072], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22080], [CVE-2025-22081], [CVE-2025-22083], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22090], [CVE-2025-22095], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38240], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39682], [CVE-2025-39728], [CVE-2025-39735], [CVE-2025-40114] |
USN-7835-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78311000000 |
false |
patch |
[USN-7831-1], [CVE-2025-48041], [CVE-2025-48038], [CVE-2025-48040], [CVE-2025-48039] |
USN-7831-1 -- Erlang vulnerabilities |
| oval:com.ubuntu.jammy:def:78296000000 |
false |
patch |
[USN-7829-6], [CVE-2023-52593], [CVE-2024-26700], [CVE-2024-26896], [CVE-2025-38727] |
USN-7829-6 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78295000000 |
false |
patch |
[USN-7829-5], [CVE-2023-52593], [CVE-2024-26700], [CVE-2024-26896], [CVE-2025-38727] |
USN-7829-5 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:78293000000 |
false |
patch |
[USN-7829-3], [CVE-2023-52593], [CVE-2024-26700], [CVE-2024-26896], [CVE-2025-38727] |
USN-7829-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78292000000 |
false |
patch |
[USN-7829-2], [CVE-2023-52593], [CVE-2024-26700], [CVE-2024-26896], [CVE-2025-38727] |
USN-7829-2 -- Linux kernel (FIPS and Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:78291000000 |
false |
patch |
[USN-7829-1], [CVE-2023-52593], [CVE-2024-26700], [CVE-2024-26896], [CVE-2025-38727] |
USN-7829-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:78281000000 |
false |
patch |
[USN-7828-1], [CVE-2025-61912], [CVE-2025-61911] |
USN-7828-1 -- Python LDAP vulnerabilities |
| oval:com.ubuntu.jammy:def:78261000000 |
false |
patch |
[USN-7826-1], [CVE-2025-10230], [CVE-2025-9640] |
USN-7826-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:78243000000 |
false |
patch |
[USN-7824-3], [CVE-2025-49844] |
USN-7824-3 -- Redis vulnerability |
| oval:com.ubuntu.jammy:def:78221000000 |
false |
patch |
[USN-7822-1], [CVE-2025-55247], [CVE-2025-55248], [CVE-2025-55315] |
USN-7822-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:78182000000 |
false |
patch |
[USN-7818-2], [CVE-2024-46901] |
USN-7818-2 -- Apache Subversion vulnerability |
| oval:com.ubuntu.jammy:def:78171000000 |
false |
patch |
[USN-7817-1], [CVE-2025-43342], [CVE-2025-43368], [CVE-2025-43272], [CVE-2025-43356] |
USN-7817-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:78161000000 |
false |
patch |
[USN-7816-1], [CVE-2025-23259] |
USN-7816-1 -- DPDK vulnerability |
| oval:com.ubuntu.jammy:def:78141000000 |
false |
patch |
[USN-7814-1], [CVE-2024-23837], [CVE-2025-53537], [CVE-2024-28871], [CVE-2024-45797] |
USN-7814-1 -- LibHTP vulnerabilities |
| oval:com.ubuntu.jammy:def:78131000000 |
false |
patch |
[USN-7813-1], [CVE-2024-45237], [CVE-2024-45234], [CVE-2024-48943], [CVE-2024-45236], [CVE-2024-45238], [CVE-2024-45239], [CVE-2024-45235] |
USN-7813-1 -- FORT Validator vulnerabilities |
| oval:com.ubuntu.jammy:def:78121000000 |
false |
patch |
[USN-7812-1], [CVE-2025-57803], [CVE-2025-55298] |
USN-7812-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:78111000000 |
false |
patch |
[USN-7811-1], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618] |
USN-7811-1 -- Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
| oval:com.ubuntu.jammy:def:78103000000 |
false |
patch |
[USN-7810-3], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618], [CVE-2025-38683] |
USN-7810-3 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:78101000000 |
false |
patch |
[USN-7810-1], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618], [CVE-2025-38683] |
USN-7810-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:78082000000 |
false |
patch |
[USN-7808-2], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-38244], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618], [CVE-2025-38683] |
USN-7808-2 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:78061000000 |
false |
patch |
[USN-7806-1], [CVE-2025-23013] |
USN-7806-1 -- PAM/U2F vulnerability |
| oval:com.ubuntu.jammy:def:78051000000 |
false |
patch |
[USN-7805-1], [CVE-2025-11230] |
USN-7805-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:78041000000 |
false |
patch |
[USN-7804-1], [CVE-2025-59362] |
USN-7804-1 -- Squid vulnerability |
| oval:com.ubuntu.jammy:def:78031000000 |
false |
patch |
[USN-7803-1], [CVE-2025-43718] |
USN-7803-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:78021000000 |
false |
patch |
[USN-7802-1], [CVE-2024-57996], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21887], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-37752], [CVE-2025-37889], [CVE-2025-37954], [CVE-2025-38350] |
USN-7802-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:78013000000 |
false |
patch |
[USN-7801-3], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618] |
USN-7801-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:78011000000 |
false |
patch |
[USN-7801-1], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618] |
USN-7801-1 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:77991000000 |
false |
patch |
[USN-7799-1], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618] |
USN-7799-1 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:77941000000 |
false |
patch |
[USN-7794-1], [CVE-2025-59681], [CVE-2025-59682] |
USN-7794-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:77935000000 |
false |
patch |
[USN-7793-5], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618] |
USN-7793-5 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:77934000000 |
false |
patch |
[USN-7793-4], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618] |
USN-7793-4 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:77933000000 |
false |
patch |
[USN-7793-3], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618] |
USN-7793-3 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77931000000 |
false |
patch |
[USN-7793-1], [CVE-2025-38477], [CVE-2025-38617], [CVE-2025-38618] |
USN-7793-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77923000000 |
false |
patch |
[USN-7792-3], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618] |
USN-7792-3 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77921000000 |
false |
patch |
[USN-7792-1], [CVE-2025-37756], [CVE-2025-37785], [CVE-2025-38477], [CVE-2025-38500], [CVE-2025-38617], [CVE-2025-38618] |
USN-7792-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77861000000 |
false |
patch |
[USN-7786-1], [CVE-2025-9231], [CVE-2025-9232], [CVE-2025-9230] |
USN-7786-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:77851000000 |
false |
patch |
[USN-7785-1], [CVE-2025-41244] |
USN-7785-1 -- Open VM Tools vulnerability |
| oval:com.ubuntu.jammy:def:77831000000 |
false |
patch |
[USN-7783-1], [CVE-2025-8961], [CVE-2025-9165], [CVE-2025-9900] |
USN-7783-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:77821000000 |
false |
patch |
[USN-7782-1], [CVE-2025-59799], [CVE-2025-7462], [CVE-2025-59798], [CVE-2025-59800] |
USN-7782-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:77801000000 |
false |
patch |
[USN-7780-1], [CVE-2023-24607], [CVE-2023-32762], [CVE-2023-33285], [CVE-2023-34410] |
USN-7780-1 -- Qt vulnerabilities |
| oval:com.ubuntu.jammy:def:77791000000 |
false |
patch |
[USN-7779-1], [CVE-2024-57996], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21887], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-22047], [CVE-2025-37752], [CVE-2025-37889], [CVE-2025-38350], [CVE-2025-38569] |
USN-7779-1 -- Linux kernel (IBM) vulnerabilities |
| oval:com.ubuntu.jammy:def:77781000000 |
false |
patch |
[USN-7778-1], [CVE-2025-9288] |
USN-7778-1 -- sha.js vulnerability |
| oval:com.ubuntu.jammy:def:77752000000 |
false |
patch |
[USN-7775-2], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37954], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7775-2 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:77751000000 |
false |
patch |
[USN-7775-1], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37954], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7775-1 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77745000000 |
false |
patch |
[USN-7774-5], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7774-5 -- Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
| oval:com.ubuntu.jammy:def:77744000000 |
false |
patch |
[USN-7774-4], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7774-4 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:77743000000 |
false |
patch |
[USN-7774-3], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7774-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:77742000000 |
false |
patch |
[USN-7774-2], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7774-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77741000000 |
false |
patch |
[USN-7774-1], [CVE-2022-48703], [CVE-2024-26726], [CVE-2024-26775], [CVE-2024-44939], [CVE-2024-57883], [CVE-2025-21888], [CVE-2025-37948], [CVE-2025-37958], [CVE-2025-37963], [CVE-2025-38067], [CVE-2025-38074], [CVE-2025-38084], [CVE-2025-38085], [CVE-2025-38086], [CVE-2025-38088], [CVE-2025-38090], [CVE-2025-38100], [CVE-2025-38102], [CVE-2025-38103], [CVE-2025-38107], [CVE-2025-38108], [CVE-2025-38111], [CVE-2025-38112], [CVE-2025-38115], [CVE-2025-38119], [CVE-2025-38120], [CVE-2025-38122], [CVE-2025-38135], [CVE-2025-38136], [CVE-2025-38138], [CVE-2025-38143], [CVE-2025-38145], [CVE-2025-38146], [CVE-2025-38147], [CVE-2025-38153], [CVE-2025-38154], [CVE-2025-38157], [CVE-2025-38159], [CVE-2025-38160], [CVE-2025-38161], [CVE-2025-38163], [CVE-2025-38167], [CVE-2025-38173], [CVE-2025-38174], [CVE-2025-38181], [CVE-2025-38184], [CVE-2025-38194], [CVE-2025-38197], [CVE-2025-38200], [CVE-2025-38203], [CVE-2025-38204], [CVE-2025-38206], [CVE-2025-38211], [CVE-2025-38212], [CVE-2025-38218], [CVE-2025-38219], [CVE-2025-38222], [CVE-2025-38226], [CVE-2025-38227], [CVE-2025-38229], [CVE-2025-38231], [CVE-2025-38237], [CVE-2025-38245], [CVE-2025-38249], [CVE-2025-38251], [CVE-2025-38257], [CVE-2025-38262], [CVE-2025-38263], [CVE-2025-38273], [CVE-2025-38280], [CVE-2025-38285], [CVE-2025-38286], [CVE-2025-38293], [CVE-2025-38298], [CVE-2025-38305], [CVE-2025-38310], [CVE-2025-38312], [CVE-2025-38313], [CVE-2025-38319], [CVE-2025-38320], [CVE-2025-38324], [CVE-2025-38326], [CVE-2025-38328], [CVE-2025-38332], [CVE-2025-38336], [CVE-2025-38337], [CVE-2025-38342], [CVE-2025-38344], [CVE-2025-38345], [CVE-2025-38346], [CVE-2025-38348], [CVE-2025-38352], [CVE-2025-38362], [CVE-2025-38363], [CVE-2025-38371], [CVE-2025-38375], [CVE-2025-38377], [CVE-2025-38384], [CVE-2025-38386], [CVE-2025-38387], [CVE-2025-38389], [CVE-2025-38391], [CVE-2025-38393], [CVE-2025-38395], [CVE-2025-38399], [CVE-2025-38400], [CVE-2025-38401], [CVE-2025-38403], [CVE-2025-38406], [CVE-2025-38410], [CVE-2025-38412], [CVE-2025-38415], [CVE-2025-38416], [CVE-2025-38418], [CVE-2025-38419], [CVE-2025-38420], [CVE-2025-38424], [CVE-2025-38428], [CVE-2025-38430], [CVE-2025-38439], [CVE-2025-38441], [CVE-2025-38443], [CVE-2025-38444], [CVE-2025-38445], [CVE-2025-38448], [CVE-2025-38457], [CVE-2025-38458], [CVE-2025-38459], [CVE-2025-38460], [CVE-2025-38461], [CVE-2025-38462], [CVE-2025-38464], [CVE-2025-38465], [CVE-2025-38466], [CVE-2025-38467], [CVE-2025-38498], [CVE-2025-38513], [CVE-2025-38514], [CVE-2025-38515], [CVE-2025-38516], [CVE-2025-38540], [CVE-2025-38542] |
USN-7774-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77731000000 |
false |
patch |
[USN-7773-1], [CVE-2025-31178], [CVE-2025-31176], [CVE-2025-31181], [CVE-2025-31179], [CVE-2025-31180], [CVE-2025-31177], [CVE-2025-3359] |
USN-7773-1 -- Gnuplot vulnerabilities |
| oval:com.ubuntu.jammy:def:77721000000 |
false |
patch |
[USN-7772-1], [CVE-2025-58068] |
USN-7772-1 -- Eventlet vulnerability |
| oval:com.ubuntu.jammy:def:77681000000 |
false |
patch |
[USN-7768-1], [CVE-2025-6297] |
USN-7768-1 -- dpkg vulnerability |
| oval:com.ubuntu.jammy:def:77672000000 |
false |
patch |
[USN-7767-2], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-37889] |
USN-7767-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:77661000000 |
false |
patch |
[USN-7766-1], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-37889] |
USN-7766-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77651000000 |
false |
patch |
[USN-7765-1], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-22047], [CVE-2025-37889], [CVE-2025-38569] |
USN-7765-1 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:77642000000 |
false |
patch |
[USN-7764-2], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-22047], [CVE-2025-37889], [CVE-2025-38569] |
USN-7764-2 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:77641000000 |
false |
patch |
[USN-7764-1], [CVE-2024-58090], [CVE-2025-21872], [CVE-2025-21873], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21880], [CVE-2025-21881], [CVE-2025-21883], [CVE-2025-21885], [CVE-2025-21888], [CVE-2025-21889], [CVE-2025-21890], [CVE-2025-21891], [CVE-2025-21892], [CVE-2025-21894], [CVE-2025-21895], [CVE-2025-21898], [CVE-2025-21899], [CVE-2025-21903], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21908], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21911], [CVE-2025-21912], [CVE-2025-21913], [CVE-2025-21914], [CVE-2025-21915], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21918], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21927], [CVE-2025-21928], [CVE-2025-21929], [CVE-2025-21930], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21936], [CVE-2025-21937], [CVE-2025-21941], [CVE-2025-21944], [CVE-2025-21945], [CVE-2025-21946], [CVE-2025-21947], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21955], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21960], [CVE-2025-21961], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21966], [CVE-2025-21967], [CVE-2025-21968], [CVE-2025-21969], [CVE-2025-21970], [CVE-2025-21972], [CVE-2025-21975], [CVE-2025-21976], [CVE-2025-21977], [CVE-2025-21978], [CVE-2025-21979], [CVE-2025-21980], [CVE-2025-21981], [CVE-2025-21982], [CVE-2025-21986], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21995], [CVE-2025-21996], [CVE-2025-21997], [CVE-2025-21999], [CVE-2025-22001], [CVE-2025-22003], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22009], [CVE-2025-22010], [CVE-2025-22011], [CVE-2025-22013], [CVE-2025-22014], [CVE-2025-22015], [CVE-2025-22016], [CVE-2025-22017], [CVE-2025-22047], [CVE-2025-37889], [CVE-2025-38569] |
USN-7764-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77621000000 |
false |
patch |
[USN-7762-1], [CVE-2023-32681], [CVE-2024-3651], [CVE-2023-45803], [CVE-2024-47081] |
USN-7762-1 -- pip vulnerabilities |
| oval:com.ubuntu.jammy:def:77601000000 |
false |
patch |
[USN-7760-1], [CVE-2025-8058] |
USN-7760-1 -- GNU C Library vulnerability |
| oval:com.ubuntu.jammy:def:77584000000 |
false |
patch |
[USN-7758-4] |
USN-7758-4 -- Linux kernel (Oracle) vulnerability |
| oval:com.ubuntu.jammy:def:77582000000 |
false |
patch |
[USN-7758-2] |
USN-7758-2 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:77581000000 |
false |
patch |
[USN-7758-1] |
USN-7758-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:77571000000 |
false |
patch |
[USN-7757-1], [CVE-2025-54874], [CVE-2025-50952] |
USN-7757-1 -- OpenJPEG vulnerabilities |
| oval:com.ubuntu.jammy:def:77561000000 |
false |
patch |
[USN-7756-1], [CVE-2025-55212], [CVE-2025-55154], [CVE-2025-55160], [CVE-2025-57807] |
USN-7756-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:77531000000 |
false |
patch |
[USN-7753-1], [CVE-2025-9375] |
USN-7753-1 -- xmltodict vulnerability |
| oval:com.ubuntu.jammy:def:77501000000 |
false |
patch |
[USN-7750-1], [CVE-2025-40928] |
USN-7750-1 -- JSON-XS vulnerability |
| oval:com.ubuntu.jammy:def:77491000000 |
false |
patch |
[USN-7749-1], [CVE-2025-40929] |
USN-7749-1 -- Cpanel-JSON-XS vulnerability |
| oval:com.ubuntu.jammy:def:77471000000 |
false |
patch |
[USN-7747-1], [CVE-2023-36617] |
USN-7747-1 -- RubyGems vulnerability |
| oval:com.ubuntu.jammy:def:77461000000 |
false |
patch |
[USN-7746-1], [CVE-2025-9287] |
USN-7746-1 -- cipher-base vulnerability |
| oval:com.ubuntu.jammy:def:77451000000 |
false |
patch |
[USN-7745-1], [CVE-2025-58060], [CVE-2025-58364] |
USN-7745-1 -- CUPS vulnerabilities |
| oval:com.ubuntu.jammy:def:77441000000 |
false |
patch |
[USN-7744-1], [CVE-2024-3447], [CVE-2024-3446], [CVE-2024-3567], [CVE-2024-4467], [CVE-2024-6505], [CVE-2024-7409], [CVE-2024-8354] |
USN-7744-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:77431000000 |
false |
patch |
[USN-7743-1], [CVE-2025-9714] |
USN-7743-1 -- libxml2 vulnerability |
| oval:com.ubuntu.jammy:def:77411000000 |
false |
patch |
[USN-7741-1], [CVE-2025-8713], [CVE-2025-8714], [CVE-2025-8715] |
USN-7741-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:77401000000 |
false |
patch |
[USN-7740-1], [CVE-2022-4121] |
USN-7740-1 -- LibEtPan vulnerability |
| oval:com.ubuntu.jammy:def:77371000000 |
false |
patch |
[USN-7737-1], [CVE-2024-49887], [CVE-2024-52559], [CVE-2024-54456], [CVE-2024-54458], [CVE-2024-57834], [CVE-2024-57953], [CVE-2024-57973], [CVE-2024-57974], [CVE-2024-57975], [CVE-2024-57977], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57982], [CVE-2024-57984], [CVE-2024-57986], [CVE-2024-57990], [CVE-2024-57993], [CVE-2024-57994], [CVE-2024-57997], [CVE-2024-57998], [CVE-2024-57999], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58003], [CVE-2024-58005], [CVE-2024-58006], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58011], [CVE-2024-58013], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58018], [CVE-2024-58019], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58053], [CVE-2024-58054], [CVE-2024-58055], [CVE-2024-58056], [CVE-2024-58057], [CVE-2024-58058], [CVE-2024-58061], [CVE-2024-58063], [CVE-2024-58068], [CVE-2024-58069], [CVE-2024-58070], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58077], [CVE-2024-58078], [CVE-2024-58079], [CVE-2024-58080], [CVE-2024-58081], [CVE-2024-58082], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58088], [CVE-2024-58093], [CVE-2025-21704], [CVE-2025-21705], [CVE-2025-21706], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21710], [CVE-2025-21711], [CVE-2025-21712], [CVE-2025-21714], [CVE-2025-21715], [CVE-2025-21716], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21720], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21723], [CVE-2025-21724], [CVE-2025-21725], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21732], [CVE-2025-21733], [CVE-2025-21734], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21738], [CVE-2025-21739], [CVE-2025-21741], [CVE-2025-21742], [CVE-2025-21743], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21746], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21750], [CVE-2025-21753], [CVE-2025-21754], [CVE-2025-21758], [CVE-2025-21759], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21768], [CVE-2025-21772], [CVE-2025-21773], [CVE-2025-21775], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21780], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21783], [CVE-2025-21784], [CVE-2025-21785], [CVE-2025-21786], [CVE-2025-21787], [CVE-2025-21790], [CVE-2025-21791], [CVE-2025-21792], [CVE-2025-21793], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21798], [CVE-2025-21799], [CVE-2025-21801], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21808], [CVE-2025-21809], [CVE-2025-21810], [CVE-2025-21811], [CVE-2025-21812], [CVE-2025-21814], [CVE-2025-21815], [CVE-2025-21816], [CVE-2025-21820], [CVE-2025-21821], [CVE-2025-21823], [CVE-2025-21825], [CVE-2025-21826], [CVE-2025-21828], [CVE-2025-21829], [CVE-2025-21830], [CVE-2025-21832], [CVE-2025-21835], [CVE-2025-21836], [CVE-2025-21838], [CVE-2025-21839], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21847], [CVE-2025-21848], [CVE-2025-21853], [CVE-2025-21854], [CVE-2025-21855], [CVE-2025-21856], [CVE-2025-21857], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21861], [CVE-2025-21862], [CVE-2025-21863], [CVE-2025-21864], [CVE-2025-21866], [CVE-2025-21867], [CVE-2025-21868], [CVE-2025-21869], [CVE-2025-21870], [CVE-2025-21871], [CVE-2025-37750], [CVE-2025-37797], [CVE-2025-37974], [CVE-2025-38083] |
USN-7737-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:77361000000 |
false |
patch |
[USN-7736-1], [CVE-2025-57833] |
USN-7736-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:77351000000 |
false |
patch |
[USN-7735-1], [CVE-2025-24294], [CVE-2023-28755] |
USN-7735-1 -- RubyGems vulnerabilities |
| oval:com.ubuntu.jammy:def:77341000000 |
false |
patch |
[USN-7734-1], [CVE-2025-24294], [CVE-2024-35176], [CVE-2024-27282], [CVE-2024-27280] |
USN-7734-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:77321000000 |
false |
patch |
[USN-7732-1], [CVE-2024-50624] |
USN-7732-1 -- KMail Account Wizard vulnerability |
| oval:com.ubuntu.jammy:def:77281000000 |
false |
patch |
[USN-7728-1], [CVE-2025-53019], [CVE-2025-53101], [CVE-2025-53014] |
USN-7728-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:77265000000 |
false |
patch |
[USN-7726-5], [CVE-2024-27407], [CVE-2024-57996], [CVE-2025-37752], [CVE-2025-38350] |
USN-7726-5 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:77264000000 |
false |
patch |
[USN-7726-4], [CVE-2024-27407], [CVE-2024-57996], [CVE-2025-37752], [CVE-2025-38350] |
USN-7726-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77263000000 |
false |
patch |
[USN-7726-3], [CVE-2024-27407], [CVE-2024-57996], [CVE-2025-37752], [CVE-2025-38350] |
USN-7726-3 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77262000000 |
false |
patch |
[USN-7726-2], [CVE-2024-27407], [CVE-2024-57996], [CVE-2025-37752], [CVE-2025-38350] |
USN-7726-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:77261000000 |
false |
patch |
[USN-7726-1], [CVE-2024-27407], [CVE-2024-57996], [CVE-2025-37752], [CVE-2025-38350] |
USN-7726-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77253000000 |
false |
patch |
[USN-7725-3], [CVE-2024-57996], [CVE-2025-21887], [CVE-2025-37752], [CVE-2025-38350] |
USN-7725-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77251000000 |
false |
patch |
[USN-7725-1], [CVE-2024-57996], [CVE-2025-21887], [CVE-2025-37752], [CVE-2025-38350] |
USN-7725-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77231000000 |
false |
patch |
[USN-7723-1], [CVE-2025-8067] |
USN-7723-1 -- UDisks vulnerability |
| oval:com.ubuntu.jammy:def:77171000000 |
false |
patch |
[USN-7717-1], [CVE-2025-47183], [CVE-2025-47219] |
USN-7717-1 -- GStreamer Good Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:77161000000 |
false |
patch |
[USN-7716-1], [CVE-2025-47808], [CVE-2025-47807], [CVE-2025-47806] |
USN-7716-1 -- GStreamer Base Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:77151000000 |
false |
patch |
[USN-7715-1], [CVE-2025-53859] |
USN-7715-1 -- nginx vulnerability |
| oval:com.ubuntu.jammy:def:77121000000 |
false |
patch |
[USN-7712-1], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46787], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50047], [CVE-2024-50073], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53051], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37798], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37890], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37932], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37997], [CVE-2025-37998], [CVE-2025-38000], [CVE-2025-38001], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079], [CVE-2025-38083], [CVE-2025-38094], [CVE-2025-38177] |
USN-7712-1 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77111000000 |
false |
patch |
[USN-7711-1], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50073], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079], [CVE-2025-38083], [CVE-2025-38094] |
USN-7711-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:77102000000 |
false |
patch |
[USN-7710-2], [CVE-2025-8194] |
USN-7710-2 -- Python 2.7 vulnerability |
| oval:com.ubuntu.jammy:def:77101000000 |
false |
patch |
[USN-7710-1], [CVE-2025-8194], [CVE-2025-6069] |
USN-7710-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:77091000000 |
false |
patch |
[USN-7709-1], [CVE-2025-6442] |
USN-7709-1 -- WEBrick vulnerability |
| oval:com.ubuntu.jammy:def:77081000000 |
false |
patch |
[USN-7708-1], [CVE-2025-50420] |
USN-7708-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:77071000000 |
false |
patch |
[USN-7707-1], [CVE-2025-8177], [CVE-2025-8851], [CVE-2025-8534], [CVE-2025-8176] |
USN-7707-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:77045000000 |
false |
patch |
[USN-7704-5], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079] |
USN-7704-5 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77044000000 |
false |
patch |
[USN-7704-4], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079] |
USN-7704-4 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:77043000000 |
false |
patch |
[USN-7704-3], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079] |
USN-7704-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77042000000 |
false |
patch |
[USN-7704-2], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079] |
USN-7704-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:77041000000 |
false |
patch |
[USN-7704-1], [CVE-2025-38003], [CVE-2025-38004], [CVE-2025-38031], [CVE-2025-38034], [CVE-2025-38035], [CVE-2025-38037], [CVE-2025-38043], [CVE-2025-38044], [CVE-2025-38048], [CVE-2025-38051], [CVE-2025-38052], [CVE-2025-38058], [CVE-2025-38061], [CVE-2025-38065], [CVE-2025-38066], [CVE-2025-38068], [CVE-2025-38072], [CVE-2025-38075], [CVE-2025-38077], [CVE-2025-38078], [CVE-2025-38079] |
USN-7704-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77034000000 |
false |
patch |
[USN-7703-4], [CVE-2024-52559], [CVE-2024-54456], [CVE-2024-54458], [CVE-2024-57834], [CVE-2024-57977], [CVE-2024-58020], [CVE-2024-58086], [CVE-2024-58088], [CVE-2024-58093], [CVE-2025-21704], [CVE-2025-21706], [CVE-2025-21712], [CVE-2025-21746], [CVE-2025-21758], [CVE-2025-21759], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21768], [CVE-2025-21772], [CVE-2025-21773], [CVE-2025-21775], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21780], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21783], [CVE-2025-21784], [CVE-2025-21785], [CVE-2025-21786], [CVE-2025-21787], [CVE-2025-21790], [CVE-2025-21791], [CVE-2025-21792], [CVE-2025-21793], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21821], [CVE-2025-21823], [CVE-2025-21835], [CVE-2025-21836], [CVE-2025-21838], [CVE-2025-21839], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21847], [CVE-2025-21848], [CVE-2025-21853], [CVE-2025-21854], [CVE-2025-21855], [CVE-2025-21856], [CVE-2025-21857], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21861], [CVE-2025-21862], [CVE-2025-21863], [CVE-2025-21864], [CVE-2025-21866], [CVE-2025-21867], [CVE-2025-21868], [CVE-2025-21869], [CVE-2025-21870], [CVE-2025-21871] |
USN-7703-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77033000000 |
false |
patch |
[USN-7703-3], [CVE-2024-52559], [CVE-2024-54456], [CVE-2024-54458], [CVE-2024-57834], [CVE-2024-57977], [CVE-2024-58020], [CVE-2024-58086], [CVE-2024-58088], [CVE-2024-58093], [CVE-2025-21704], [CVE-2025-21706], [CVE-2025-21712], [CVE-2025-21746], [CVE-2025-21758], [CVE-2025-21759], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21768], [CVE-2025-21772], [CVE-2025-21773], [CVE-2025-21775], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21780], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21783], [CVE-2025-21784], [CVE-2025-21785], [CVE-2025-21786], [CVE-2025-21787], [CVE-2025-21790], [CVE-2025-21791], [CVE-2025-21792], [CVE-2025-21793], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21821], [CVE-2025-21823], [CVE-2025-21835], [CVE-2025-21836], [CVE-2025-21838], [CVE-2025-21839], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21847], [CVE-2025-21848], [CVE-2025-21853], [CVE-2025-21854], [CVE-2025-21855], [CVE-2025-21856], [CVE-2025-21857], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21861], [CVE-2025-21862], [CVE-2025-21863], [CVE-2025-21864], [CVE-2025-21866], [CVE-2025-21867], [CVE-2025-21868], [CVE-2025-21869], [CVE-2025-21870], [CVE-2025-21871] |
USN-7703-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:77032000000 |
false |
patch |
[USN-7703-2], [CVE-2024-52559], [CVE-2024-54456], [CVE-2024-54458], [CVE-2024-57834], [CVE-2024-57977], [CVE-2024-58020], [CVE-2024-58086], [CVE-2024-58088], [CVE-2024-58093], [CVE-2025-21704], [CVE-2025-21706], [CVE-2025-21712], [CVE-2025-21746], [CVE-2025-21758], [CVE-2025-21759], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21768], [CVE-2025-21772], [CVE-2025-21773], [CVE-2025-21775], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21780], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21783], [CVE-2025-21784], [CVE-2025-21785], [CVE-2025-21786], [CVE-2025-21787], [CVE-2025-21790], [CVE-2025-21791], [CVE-2025-21792], [CVE-2025-21793], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21821], [CVE-2025-21823], [CVE-2025-21835], [CVE-2025-21836], [CVE-2025-21838], [CVE-2025-21839], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21847], [CVE-2025-21848], [CVE-2025-21853], [CVE-2025-21854], [CVE-2025-21855], [CVE-2025-21856], [CVE-2025-21857], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21861], [CVE-2025-21862], [CVE-2025-21863], [CVE-2025-21864], [CVE-2025-21866], [CVE-2025-21867], [CVE-2025-21868], [CVE-2025-21869], [CVE-2025-21870], [CVE-2025-21871] |
USN-7703-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77031000000 |
false |
patch |
[USN-7703-1], [CVE-2024-52559], [CVE-2024-54456], [CVE-2024-54458], [CVE-2024-57834], [CVE-2024-57977], [CVE-2024-58020], [CVE-2024-58086], [CVE-2024-58088], [CVE-2024-58093], [CVE-2025-21704], [CVE-2025-21706], [CVE-2025-21712], [CVE-2025-21746], [CVE-2025-21758], [CVE-2025-21759], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21768], [CVE-2025-21772], [CVE-2025-21773], [CVE-2025-21775], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21780], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21783], [CVE-2025-21784], [CVE-2025-21785], [CVE-2025-21786], [CVE-2025-21787], [CVE-2025-21790], [CVE-2025-21791], [CVE-2025-21792], [CVE-2025-21793], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21821], [CVE-2025-21823], [CVE-2025-21835], [CVE-2025-21836], [CVE-2025-21838], [CVE-2025-21839], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21847], [CVE-2025-21848], [CVE-2025-21853], [CVE-2025-21854], [CVE-2025-21855], [CVE-2025-21856], [CVE-2025-21857], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21861], [CVE-2025-21862], [CVE-2025-21863], [CVE-2025-21864], [CVE-2025-21866], [CVE-2025-21867], [CVE-2025-21868], [CVE-2025-21869], [CVE-2025-21870], [CVE-2025-21871] |
USN-7703-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:77021000000 |
false |
patch |
[USN-7702-1], [CVE-2025-31278], [CVE-2025-43212], [CVE-2025-43211], [CVE-2025-31273], [CVE-2025-43227], [CVE-2025-6558], [CVE-2025-43240], [CVE-2025-43265], [CVE-2025-43216], [CVE-2025-43228] |
USN-7702-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:77001000000 |
false |
patch |
[USN-7700-1], [CVE-2023-4039] |
USN-7700-1 -- GCC vulnerability |
| oval:com.ubuntu.jammy:def:76971000000 |
false |
patch |
[USN-7697-1], [CVE-2025-54409], [CVE-2025-54389] |
USN-7697-1 -- AIDE vulnerabilities |
| oval:com.ubuntu.jammy:def:76951000000 |
false |
patch |
[USN-7695-1], [CVE-2022-23837], [CVE-2021-30151] |
USN-7695-1 -- Sidekiq vulnerabilities |
| oval:com.ubuntu.jammy:def:76941000000 |
false |
patch |
[USN-7694-1], [CVE-2025-6021], [CVE-2025-49794], [CVE-2025-6170], [CVE-2025-49796] |
USN-7694-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:76921000000 |
false |
patch |
[USN-7692-1], [CVE-2023-45024], [CVE-2025-30087], [CVE-2024-3262], [CVE-2025-31501], [CVE-2022-25803], [CVE-2022-25802], [CVE-2025-31500], [CVE-2025-2545], [CVE-2023-41260], [CVE-2023-41259], [CVE-2021-38562] |
USN-7692-1 -- Request Tracker vulnerabilities |
| oval:com.ubuntu.jammy:def:76911000000 |
false |
patch |
[USN-7691-1], [CVE-2025-50099], [CVE-2025-50100], [CVE-2025-50080], [CVE-2025-50079], [CVE-2025-50101], [CVE-2025-50098], [CVE-2025-50094], [CVE-2025-50097], [CVE-2025-50102], [CVE-2025-50081], [CVE-2025-50093], [CVE-2025-50083], [CVE-2025-50077], [CVE-2025-50096], [CVE-2025-50087], [CVE-2025-50082], [CVE-2025-53023], [CVE-2025-50092], [CVE-2025-50091], [CVE-2025-50086], [CVE-2025-50084], [CVE-2025-50104], [CVE-2025-50078], [CVE-2025-50085] |
USN-7691-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:76901000000 |
false |
patch |
[USN-7690-1], [CVE-2025-50106], [CVE-2025-30754], [CVE-2025-50059], [CVE-2025-30749] |
USN-7690-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:76861000000 |
false |
patch |
[USN-7686-1], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46787], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50047], [CVE-2024-50073], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53051], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37798], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37890], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37932], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37997], [CVE-2025-37998], [CVE-2025-38000], [CVE-2025-38001], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38083], [CVE-2025-38094], [CVE-2025-38177] |
USN-7686-1 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:76833000000 |
false |
patch |
[USN-7683-3], [CVE-2024-50073], [CVE-2025-38083] |
USN-7683-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:76832000000 |
false |
patch |
[USN-7683-2], [CVE-2024-50073], [CVE-2025-38083] |
USN-7683-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:76831000000 |
false |
patch |
[USN-7683-1], [CVE-2024-50073], [CVE-2025-38083] |
USN-7683-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76826000000 |
false |
patch |
[USN-7682-6], [CVE-2025-37797], [CVE-2025-38083] |
USN-7682-6 -- Linux kernel (IBM) vulnerabilities |
| oval:com.ubuntu.jammy:def:76825000000 |
false |
patch |
[USN-7682-5], [CVE-2025-37797], [CVE-2025-38083] |
USN-7682-5 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76824000000 |
false |
patch |
[USN-7682-4], [CVE-2025-37797], [CVE-2025-38083] |
USN-7682-4 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:76822000000 |
false |
patch |
[USN-7682-2], [CVE-2025-37797], [CVE-2025-38083] |
USN-7682-2 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:76821000000 |
false |
patch |
[USN-7682-1], [CVE-2025-37797], [CVE-2025-38083] |
USN-7682-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76781000000 |
false |
patch |
[USN-7678-1], [CVE-2025-40909] |
USN-7678-1 -- Perl vulnerability |
| oval:com.ubuntu.jammy:def:76771000000 |
false |
patch |
[USN-7677-1], [CVE-2024-6174], [CVE-2024-11584] |
USN-7677-1 -- cloud-init vulnerabilities |
| oval:com.ubuntu.jammy:def:76761000000 |
false |
patch |
[USN-7676-1], [CVE-2025-6965] |
USN-7676-1 -- SQLite vulnerability |
| oval:com.ubuntu.jammy:def:76751000000 |
false |
patch |
[USN-7675-1], [CVE-2025-52886] |
USN-7675-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:76741000000 |
false |
patch |
[USN-7674-1], [CVE-2025-30761], [CVE-2025-30754], [CVE-2025-50106], [CVE-2025-30749], [CVE-2025-50059] |
USN-7674-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:76701000000 |
false |
patch |
[USN-7670-1], [CVE-2025-47268], [CVE-2025-48964] |
USN-7670-1 -- iputils vulnerability |
| oval:com.ubuntu.jammy:def:76681000000 |
false |
patch |
[USN-7668-1], [CVE-2025-30754], [CVE-2025-50059], [CVE-2025-50106], [CVE-2025-30749] |
USN-7668-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:76671000000 |
false |
patch |
[USN-7667-1], [CVE-2025-30749], [CVE-2025-30761], [CVE-2025-50106], [CVE-2025-30754] |
USN-7667-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:76661000000 |
false |
patch |
[USN-7666-1], [CVE-2025-5994] |
USN-7666-1 -- Unbound vulnerabilities |
| oval:com.ubuntu.jammy:def:76641000000 |
false |
patch |
[USN-7664-1], [CVE-2022-29970], [CVE-2022-45442] |
USN-7664-1 -- Sinatra vulnerabilities |
| oval:com.ubuntu.jammy:def:76631000000 |
false |
patch |
[USN-7663-1], [CVE-2024-43097], [CVE-2025-0238], [CVE-2025-0242], [CVE-2025-0510], [CVE-2025-1009], [CVE-2025-1010], [CVE-2025-1011], [CVE-2025-1012], [CVE-2025-1013], [CVE-2025-1014], [CVE-2025-1015], [CVE-2025-1016], [CVE-2025-1017], [CVE-2025-1930], [CVE-2025-1931], [CVE-2025-1932], [CVE-2025-1933], [CVE-2025-1934], [CVE-2025-1935], [CVE-2025-1936], [CVE-2025-1937], [CVE-2025-1938], [CVE-2025-26695], [CVE-2025-26696], [CVE-2025-2830], [CVE-2025-3028], [CVE-2025-3029], [CVE-2025-3030], [CVE-2025-3522], [CVE-2025-3523], [CVE-2025-3875], [CVE-2025-3909], [CVE-2025-3932], [CVE-2025-4083], [CVE-2025-4087], [CVE-2025-4091], [CVE-2025-4093], [CVE-2025-4918], [CVE-2025-4919], [CVE-2025-5263], [CVE-2025-5264], [CVE-2025-5265], [CVE-2025-5266], [CVE-2025-5267], [CVE-2025-5268], [CVE-2025-5269], [CVE-2025-5986], [CVE-2025-6424], [CVE-2025-6425], [CVE-2025-6426], [CVE-2025-6429], [CVE-2025-6430] |
USN-7663-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:76621000000 |
false |
patch |
[USN-7662-1], [CVE-2025-6199], [CVE-2025-7345] |
USN-7662-1 -- GDK-PixBuf vulnerabilities |
| oval:com.ubuntu.jammy:def:76611000000 |
false |
patch |
[USN-7661-1], [CVE-2025-43970], [CVE-2023-46565], [CVE-2025-43973], [CVE-2025-43971], [CVE-2025-43972] |
USN-7661-1 -- GoBGP vulnerabilities |
| oval:com.ubuntu.jammy:def:76601000000 |
false |
patch |
[USN-7660-1], [CVE-2023-34823], [CVE-2022-37781], [CVE-2022-36148], [CVE-2023-34824] |
USN-7660-1 -- fdkaac vulnerabilities |
| oval:com.ubuntu.jammy:def:76591000000 |
false |
patch |
[USN-7659-1], [CVE-2022-29181], [CVE-2022-40303], [CVE-2020-26247] |
USN-7659-1 -- Nokogiri vulnerabilities |
| oval:com.ubuntu.jammy:def:76571000000 |
false |
patch |
[USN-7657-1], [CVE-2025-48060], [CVE-2024-23337], [CVE-2024-53427] |
USN-7657-1 -- jq vulnerabilities |
| oval:com.ubuntu.jammy:def:76561000000 |
false |
patch |
[USN-7656-1], [CVE-2025-46712], [CVE-2025-4748] |
USN-7656-1 -- Erlang vulnerabilities |
| oval:com.ubuntu.jammy:def:76545000000 |
false |
patch |
[USN-7654-5], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38094] |
USN-7654-5 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:76544000000 |
false |
patch |
[USN-7654-4], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38094] |
USN-7654-4 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:76543000000 |
false |
patch |
[USN-7654-3], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38094] |
USN-7654-3 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:76542000000 |
false |
patch |
[USN-7654-2], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38094] |
USN-7654-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:76541000000 |
false |
patch |
[USN-7654-1], [CVE-2022-21546], [CVE-2022-48893], [CVE-2022-49063], [CVE-2022-49168], [CVE-2022-49535], [CVE-2023-52572], [CVE-2023-52757], [CVE-2024-26686], [CVE-2024-26739], [CVE-2024-27402], [CVE-2024-35790], [CVE-2024-35866], [CVE-2024-35867], [CVE-2024-35943], [CVE-2024-36908], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-42322], [CVE-2024-46742], [CVE-2024-46751], [CVE-2024-46774], [CVE-2024-46816], [CVE-2024-49960], [CVE-2024-49989], [CVE-2024-50125], [CVE-2024-50258], [CVE-2024-50272], [CVE-2024-50280], [CVE-2024-53128], [CVE-2024-53203], [CVE-2024-54458], [CVE-2024-56751], [CVE-2025-21839], [CVE-2025-21853], [CVE-2025-22027], [CVE-2025-22062], [CVE-2025-23140], [CVE-2025-23142], [CVE-2025-23144], [CVE-2025-23145], [CVE-2025-23146], [CVE-2025-23147], [CVE-2025-23148], [CVE-2025-23150], [CVE-2025-23151], [CVE-2025-23156], [CVE-2025-23157], [CVE-2025-23158], [CVE-2025-23159], [CVE-2025-23161], [CVE-2025-23163], [CVE-2025-37738], [CVE-2025-37739], [CVE-2025-37740], [CVE-2025-37741], [CVE-2025-37742], [CVE-2025-37749], [CVE-2025-37756], [CVE-2025-37757], [CVE-2025-37758], [CVE-2025-37765], [CVE-2025-37766], [CVE-2025-37767], [CVE-2025-37768], [CVE-2025-37770], [CVE-2025-37771], [CVE-2025-37773], [CVE-2025-37780], [CVE-2025-37781], [CVE-2025-37787], [CVE-2025-37788], [CVE-2025-37789], [CVE-2025-37790], [CVE-2025-37792], [CVE-2025-37794], [CVE-2025-37796], [CVE-2025-37797], [CVE-2025-37803], [CVE-2025-37805], [CVE-2025-37808], [CVE-2025-37810], [CVE-2025-37811], [CVE-2025-37812], [CVE-2025-37817], [CVE-2025-37819], [CVE-2025-37823], [CVE-2025-37824], [CVE-2025-37829], [CVE-2025-37830], [CVE-2025-37836], [CVE-2025-37838], [CVE-2025-37839], [CVE-2025-37840], [CVE-2025-37841], [CVE-2025-37844], [CVE-2025-37850], [CVE-2025-37851], [CVE-2025-37857], [CVE-2025-37858], [CVE-2025-37859], [CVE-2025-37862], [CVE-2025-37867], [CVE-2025-37871], [CVE-2025-37875], [CVE-2025-37881], [CVE-2025-37883], [CVE-2025-37885], [CVE-2025-37892], [CVE-2025-37905], [CVE-2025-37909], [CVE-2025-37911], [CVE-2025-37912], [CVE-2025-37913], [CVE-2025-37914], [CVE-2025-37915], [CVE-2025-37923], [CVE-2025-37927], [CVE-2025-37930], [CVE-2025-37940], [CVE-2025-37949], [CVE-2025-37964], [CVE-2025-37967], [CVE-2025-37969], [CVE-2025-37970], [CVE-2025-37982], [CVE-2025-37983], [CVE-2025-37985], [CVE-2025-37989], [CVE-2025-37990], [CVE-2025-37991], [CVE-2025-37992], [CVE-2025-37994], [CVE-2025-37995], [CVE-2025-37998], [CVE-2025-38005], [CVE-2025-38009], [CVE-2025-38023], [CVE-2025-38024], [CVE-2025-38094] |
USN-7654-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76531000000 |
false |
patch |
[USN-7653-1], [CVE-2024-49887], [CVE-2024-50157], [CVE-2024-53124], [CVE-2024-57924], [CVE-2024-57948], [CVE-2024-57949], [CVE-2024-57951], [CVE-2024-57952], [CVE-2024-57953], [CVE-2024-57973], [CVE-2024-57974], [CVE-2024-57975], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57982], [CVE-2024-57984], [CVE-2024-57986], [CVE-2024-57990], [CVE-2024-57993], [CVE-2024-57994], [CVE-2024-57996], [CVE-2024-57997], [CVE-2024-57998], [CVE-2024-57999], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58003], [CVE-2024-58005], [CVE-2024-58006], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58011], [CVE-2024-58013], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58018], [CVE-2024-58019], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58053], [CVE-2024-58054], [CVE-2024-58055], [CVE-2024-58056], [CVE-2024-58057], [CVE-2024-58058], [CVE-2024-58061], [CVE-2024-58063], [CVE-2024-58068], [CVE-2024-58069], [CVE-2024-58070], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58077], [CVE-2024-58078], [CVE-2024-58079], [CVE-2024-58080], [CVE-2024-58081], [CVE-2024-58082], [CVE-2024-58083], [CVE-2024-58085], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21667], [CVE-2025-21668], [CVE-2025-21669], [CVE-2025-21670], [CVE-2025-21672], [CVE-2025-21673], [CVE-2025-21674], [CVE-2025-21675], [CVE-2025-21676], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21681], [CVE-2025-21682], [CVE-2025-21683], [CVE-2025-21684], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21691], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699], [CVE-2025-21705], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21710], [CVE-2025-21711], [CVE-2025-21714], [CVE-2025-21715], [CVE-2025-21716], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21720], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21723], [CVE-2025-21724], [CVE-2025-21725], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21732], [CVE-2025-21733], [CVE-2025-21734], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21738], [CVE-2025-21739], [CVE-2025-21741], [CVE-2025-21742], [CVE-2025-21743], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21750], [CVE-2025-21753], [CVE-2025-21754], [CVE-2025-21798], [CVE-2025-21799], [CVE-2025-21801], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21808], [CVE-2025-21809], [CVE-2025-21810], [CVE-2025-21811], [CVE-2025-21812], [CVE-2025-21814], [CVE-2025-21815], [CVE-2025-21816], [CVE-2025-21820], [CVE-2025-21825], [CVE-2025-21826], [CVE-2025-21828], [CVE-2025-21829], [CVE-2025-21830], [CVE-2025-21832], [CVE-2025-21943], [CVE-2025-22088], [CVE-2025-2312], [CVE-2025-37750], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37974], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001], [CVE-2025-38177] |
USN-7653-1 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:76514000000 |
false |
patch |
[USN-7651-4], [CVE-2024-49887], [CVE-2024-57953], [CVE-2024-57973], [CVE-2024-57974], [CVE-2024-57975], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57982], [CVE-2024-57984], [CVE-2024-57986], [CVE-2024-57990], [CVE-2024-57993], [CVE-2024-57994], [CVE-2024-57996], [CVE-2024-57997], [CVE-2024-57998], [CVE-2024-57999], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58003], [CVE-2024-58005], [CVE-2024-58006], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58011], [CVE-2024-58013], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58018], [CVE-2024-58019], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58053], [CVE-2024-58054], [CVE-2024-58055], [CVE-2024-58056], [CVE-2024-58057], [CVE-2024-58058], [CVE-2024-58061], [CVE-2024-58063], [CVE-2024-58068], [CVE-2024-58069], [CVE-2024-58070], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58077], [CVE-2024-58078], [CVE-2024-58079], [CVE-2024-58080], [CVE-2024-58081], [CVE-2024-58082], [CVE-2024-58083], [CVE-2024-58085], [CVE-2025-21705], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21710], [CVE-2025-21711], [CVE-2025-21714], [CVE-2025-21715], [CVE-2025-21716], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21720], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21723], [CVE-2025-21724], [CVE-2025-21725], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21732], [CVE-2025-21733], [CVE-2025-21734], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21738], [CVE-2025-21739], [CVE-2025-21741], [CVE-2025-21742], [CVE-2025-21743], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21750], [CVE-2025-21753], [CVE-2025-21754], [CVE-2025-21798], [CVE-2025-21799], [CVE-2025-21801], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21808], [CVE-2025-21809], [CVE-2025-21810], [CVE-2025-21811], [CVE-2025-21812], [CVE-2025-21814], [CVE-2025-21815], [CVE-2025-21816], [CVE-2025-21820], [CVE-2025-21825], [CVE-2025-21826], [CVE-2025-21828], [CVE-2025-21829], [CVE-2025-21830], [CVE-2025-21832], [CVE-2025-37750], [CVE-2025-37974] |
USN-7651-4 -- Linux kernel (GCP) vulnerabilities |
| oval:com.ubuntu.jammy:def:76513000000 |
false |
patch |
[USN-7651-3], [CVE-2024-49887], [CVE-2024-57953], [CVE-2024-57973], [CVE-2024-57974], [CVE-2024-57975], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57982], [CVE-2024-57984], [CVE-2024-57986], [CVE-2024-57990], [CVE-2024-57993], [CVE-2024-57994], [CVE-2024-57996], [CVE-2024-57997], [CVE-2024-57998], [CVE-2024-57999], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58003], [CVE-2024-58005], [CVE-2024-58006], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58011], [CVE-2024-58013], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58018], [CVE-2024-58019], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58053], [CVE-2024-58054], [CVE-2024-58055], [CVE-2024-58056], [CVE-2024-58057], [CVE-2024-58058], [CVE-2024-58061], [CVE-2024-58063], [CVE-2024-58068], [CVE-2024-58069], [CVE-2024-58070], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58077], [CVE-2024-58078], [CVE-2024-58079], [CVE-2024-58080], [CVE-2024-58081], [CVE-2024-58082], [CVE-2024-58083], [CVE-2024-58085], [CVE-2025-21705], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21710], [CVE-2025-21711], [CVE-2025-21714], [CVE-2025-21715], [CVE-2025-21716], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21720], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21723], [CVE-2025-21724], [CVE-2025-21725], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21732], [CVE-2025-21733], [CVE-2025-21734], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21738], [CVE-2025-21739], [CVE-2025-21741], [CVE-2025-21742], [CVE-2025-21743], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21750], [CVE-2025-21753], [CVE-2025-21754], [CVE-2025-21798], [CVE-2025-21799], [CVE-2025-21801], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21808], [CVE-2025-21809], [CVE-2025-21810], [CVE-2025-21811], [CVE-2025-21812], [CVE-2025-21814], [CVE-2025-21815], [CVE-2025-21816], [CVE-2025-21820], [CVE-2025-21825], [CVE-2025-21826], [CVE-2025-21828], [CVE-2025-21829], [CVE-2025-21830], [CVE-2025-21832], [CVE-2025-37750], [CVE-2025-37974] |
USN-7651-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76512000000 |
false |
patch |
[USN-7651-2], [CVE-2024-49887], [CVE-2024-57953], [CVE-2024-57973], [CVE-2024-57974], [CVE-2024-57975], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57982], [CVE-2024-57984], [CVE-2024-57986], [CVE-2024-57990], [CVE-2024-57993], [CVE-2024-57994], [CVE-2024-57996], [CVE-2024-57997], [CVE-2024-57998], [CVE-2024-57999], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58003], [CVE-2024-58005], [CVE-2024-58006], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58011], [CVE-2024-58013], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58018], [CVE-2024-58019], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58053], [CVE-2024-58054], [CVE-2024-58055], [CVE-2024-58056], [CVE-2024-58057], [CVE-2024-58058], [CVE-2024-58061], [CVE-2024-58063], [CVE-2024-58068], [CVE-2024-58069], [CVE-2024-58070], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58077], [CVE-2024-58078], [CVE-2024-58079], [CVE-2024-58080], [CVE-2024-58081], [CVE-2024-58082], [CVE-2024-58083], [CVE-2024-58085], [CVE-2025-21705], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21710], [CVE-2025-21711], [CVE-2025-21714], [CVE-2025-21715], [CVE-2025-21716], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21720], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21723], [CVE-2025-21724], [CVE-2025-21725], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21732], [CVE-2025-21733], [CVE-2025-21734], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21738], [CVE-2025-21739], [CVE-2025-21741], [CVE-2025-21742], [CVE-2025-21743], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21750], [CVE-2025-21753], [CVE-2025-21754], [CVE-2025-21798], [CVE-2025-21799], [CVE-2025-21801], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21808], [CVE-2025-21809], [CVE-2025-21810], [CVE-2025-21811], [CVE-2025-21812], [CVE-2025-21814], [CVE-2025-21815], [CVE-2025-21816], [CVE-2025-21820], [CVE-2025-21825], [CVE-2025-21826], [CVE-2025-21828], [CVE-2025-21829], [CVE-2025-21830], [CVE-2025-21832], [CVE-2025-37750], [CVE-2025-37974] |
USN-7651-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76481000000 |
false |
patch |
[USN-7648-1], [CVE-2025-1220], [CVE-2025-1735], [CVE-2025-6491] |
USN-7648-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:76471000000 |
false |
patch |
[USN-7647-1], [CVE-2021-3693], [CVE-2021-3731], [CVE-2024-23831], [CVE-2021-3882], [CVE-2021-3694] |
USN-7647-1 -- LedgerSMB vulnerabilities |
| oval:com.ubuntu.jammy:def:76431000000 |
false |
patch |
[USN-7643-1], [CVE-2025-4969], [CVE-2025-32914], [CVE-2025-4945], [CVE-2025-32907], [CVE-2025-4948] |
USN-7643-1 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:76421000000 |
false |
patch |
[USN-7642-1], [CVE-2023-49081], [CVE-2024-52304], [CVE-2024-30251], [CVE-2023-49082], [CVE-2024-27306], [CVE-2023-47627], [CVE-2024-23829] |
USN-7642-1 -- AIOHTTP vulnerabilities |
| oval:com.ubuntu.jammy:def:76391000000 |
false |
patch |
[USN-7639-1], [CVE-2025-23048], [CVE-2025-53020], [CVE-2024-42516], [CVE-2024-43204], [CVE-2024-47252], [CVE-2025-49812], [CVE-2025-49630] |
USN-7639-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:76381000000 |
false |
patch |
[USN-7638-1], [CVE-2022-29788], [CVE-2022-1907], [CVE-2022-1908] |
USN-7638-1 -- Libmobi vulnerabilities |
| oval:com.ubuntu.jammy:def:76351000000 |
false |
patch |
[USN-7635-1], [CVE-2025-32990], [CVE-2025-32988], [CVE-2025-32989], [CVE-2025-6395] |
USN-7635-1 -- GnuTLS vulnerabilities |
| oval:com.ubuntu.jammy:def:76331000000 |
false |
patch |
[USN-7633-1], [CVE-2024-38531], [CVE-2024-27297], [CVE-2024-47174], [CVE-2024-45593] |
USN-7633-1 -- Nix vulnerabilities |
| oval:com.ubuntu.jammy:def:76321000000 |
false |
patch |
[USN-7632-1], [CVE-2025-40908] |
USN-7632-1 -- YAML-LibYAML vulnerability |
| oval:com.ubuntu.jammy:def:76311000000 |
false |
patch |
[USN-7631-1], [CVE-2025-53367] |
USN-7631-1 -- DjVuLibre vulnerability |
| oval:com.ubuntu.jammy:def:76301000000 |
false |
patch |
[USN-7630-1], [CVE-2016-6347], [CVE-2016-7050], [CVE-2020-25633], [CVE-2016-6348], [CVE-2016-6345], [CVE-2016-6346], [CVE-2021-20289], [CVE-2024-9622], [CVE-2020-1695], [CVE-2020-10688], [CVE-2023-0482] |
USN-7630-1 -- RESTEasy vulnerabilities |
| oval:com.ubuntu.jammy:def:76291000000 |
false |
patch |
[USN-7629-1], [CVE-2024-7254], [CVE-2025-4565] |
USN-7629-1 -- Protocol Buffers vulnerabilities |
| oval:com.ubuntu.jammy:def:76263000000 |
false |
patch |
[USN-7626-3] |
USN-7626-3 -- Git regression |
| oval:com.ubuntu.jammy:def:76262000000 |
false |
patch |
[USN-7626-2] |
USN-7626-2 -- Git regression |
| oval:com.ubuntu.jammy:def:76261000000 |
false |
patch |
[USN-7626-1], [CVE-2025-48385], [CVE-2025-46835], [CVE-2025-27614], [CVE-2025-48386], [CVE-2025-27613], [CVE-2025-48384] |
USN-7626-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:76251000000 |
false |
patch |
[USN-7625-1], [CVE-2018-19960], [CVE-2022-21689] |
USN-7625-1 -- OnionShare vulnerabilities |
| oval:com.ubuntu.jammy:def:76231000000 |
false |
patch |
[USN-7623-1], [CVE-2024-56827], [CVE-2025-48708], [CVE-2024-29508], [CVE-2025-27836], [CVE-2025-27832], [CVE-2025-27835], [CVE-2024-56826], [CVE-2023-39327] |
USN-7623-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:76201000000 |
false |
patch |
[USN-7620-1], [CVE-2011-10007] |
USN-7620-1 -- File::Find::Rule vulnerability |
| oval:com.ubuntu.jammy:def:76191000000 |
false |
patch |
[USN-7619-1], [CVE-2025-4878], [CVE-2025-5449], [CVE-2025-5351], [CVE-2025-4877], [CVE-2025-5987], [CVE-2025-5318], [CVE-2025-5372] |
USN-7619-1 -- libssh vulnerabilities |
| oval:com.ubuntu.jammy:def:76171000000 |
false |
patch |
[USN-7617-1], [CVE-2025-49133] |
USN-7617-1 -- libtpms vulnerability |
| oval:com.ubuntu.jammy:def:76161000000 |
false |
patch |
[USN-7616-1], [CVE-2023-6378], [CVE-2021-42550] |
USN-7616-1 -- logback vulnerabilities |
| oval:com.ubuntu.jammy:def:76151000000 |
false |
patch |
[USN-7615-1], [CVE-2025-20234], [CVE-2025-20260] |
USN-7615-1 -- ClamAV vulnerabilities |
| oval:com.ubuntu.jammy:def:76141000000 |
false |
patch |
[USN-7614-1], [CVE-2017-2661], [CVE-2022-2735], [CVE-2018-1086], [CVE-2022-1049] |
USN-7614-1 -- pcs vulnerabilities |
| oval:com.ubuntu.jammy:def:76131000000 |
false |
patch |
[USN-7613-1], [CVE-2025-0755], [CVE-2024-6381], [CVE-2024-6383] |
USN-7613-1 -- mongo-c-driver vulnerabilities |
| oval:com.ubuntu.jammy:def:76121000000 |
false |
patch |
[USN-7612-1], [CVE-2024-6839], [CVE-2024-6866], [CVE-2024-6844], [CVE-2024-6221], [CVE-2024-1681] |
USN-7612-1 -- Flask-CORS vulnerabilities |
| oval:com.ubuntu.jammy:def:76095000000 |
false |
patch |
[USN-7609-5], [CVE-2025-22088], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7609-5 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:76091000000 |
false |
patch |
[USN-7609-1], [CVE-2025-22088], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7609-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76087000000 |
false |
patch |
[USN-7608-7], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-7 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:76086000000 |
false |
patch |
[USN-7608-6], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-6 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:76085000000 |
false |
patch |
[USN-7608-5], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-5 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76084000000 |
false |
patch |
[USN-7608-4], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76083000000 |
false |
patch |
[USN-7608-3], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:76082000000 |
false |
patch |
[USN-7608-2], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:76081000000 |
false |
patch |
[USN-7608-1], [CVE-2024-46787], [CVE-2024-50047], [CVE-2024-53051], [CVE-2025-37798], [CVE-2025-37890], [CVE-2025-37932], [CVE-2025-37997], [CVE-2025-38000], [CVE-2025-38001] |
USN-7608-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:76041000000 |
false |
patch |
[USN-7604-1], [CVE-2025-32462], [CVE-2025-32463] |
USN-7604-1 -- Sudo vulnerabilities |
| oval:com.ubuntu.jammy:def:76031000000 |
false |
patch |
[USN-7603-1], [CVE-2024-35241], [CVE-2024-35242], [CVE-2024-24821], [CVE-2023-43655], [CVE-2022-24828] |
USN-7603-1 -- Composer vulnerabilities |
| oval:com.ubuntu.jammy:def:76021000000 |
false |
patch |
[USN-7602-1], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-52664], [CVE-2023-52927], [CVE-2023-53034], [CVE-2024-26982], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-47726], [CVE-2024-53144], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56599], [CVE-2024-56608], [CVE-2024-56664], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21941], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21971], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7602-1 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:76011000000 |
false |
patch |
[USN-7601-1], [CVE-2025-5917], [CVE-2025-5915], [CVE-2025-5916], [CVE-2025-5914] |
USN-7601-1 -- libarchive vulnerabilities |
| oval:com.ubuntu.jammy:def:76001000000 |
false |
patch |
[USN-7600-1], [CVE-2023-40403] |
USN-7600-1 -- libxslt vulnerability |
| oval:com.ubuntu.jammy:def:75992000000 |
false |
patch |
[USN-7599-2], [CVE-2025-50181] |
USN-7599-2 -- pip vulnerability |
| oval:com.ubuntu.jammy:def:75991000000 |
false |
patch |
[USN-7599-1], [CVE-2025-50182], [CVE-2025-50181] |
USN-7599-1 -- urllib3 vulnerabilities |
| oval:com.ubuntu.jammy:def:75972000000 |
false |
patch |
[USN-7597-2], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7597-2 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75971000000 |
false |
patch |
[USN-7597-1], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7597-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:75961000000 |
false |
patch |
[USN-7596-1], [CVE-2024-50157], [CVE-2024-53124], [CVE-2024-57924], [CVE-2024-57948], [CVE-2024-57949], [CVE-2024-57951], [CVE-2024-57952], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21667], [CVE-2025-21668], [CVE-2025-21669], [CVE-2025-21670], [CVE-2025-21672], [CVE-2025-21673], [CVE-2025-21674], [CVE-2025-21675], [CVE-2025-21676], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21681], [CVE-2025-21682], [CVE-2025-21683], [CVE-2025-21684], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21691], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699], [CVE-2025-21943] |
USN-7596-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:75955000000 |
false |
patch |
[USN-7595-5], [CVE-2024-50157], [CVE-2024-53124], [CVE-2024-57924], [CVE-2024-57948], [CVE-2024-57949], [CVE-2024-57951], [CVE-2024-57952], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21667], [CVE-2025-21668], [CVE-2025-21669], [CVE-2025-21670], [CVE-2025-21672], [CVE-2025-21673], [CVE-2025-21674], [CVE-2025-21675], [CVE-2025-21676], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21681], [CVE-2025-21682], [CVE-2025-21683], [CVE-2025-21684], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21691], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699], [CVE-2025-21943], [CVE-2025-2312] |
USN-7595-5 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75954000000 |
false |
patch |
[USN-7595-4], [CVE-2024-50157], [CVE-2024-53124], [CVE-2024-57924], [CVE-2024-57948], [CVE-2024-57949], [CVE-2024-57951], [CVE-2024-57952], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21667], [CVE-2025-21668], [CVE-2025-21669], [CVE-2025-21670], [CVE-2025-21672], [CVE-2025-21673], [CVE-2025-21674], [CVE-2025-21675], [CVE-2025-21676], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21681], [CVE-2025-21682], [CVE-2025-21683], [CVE-2025-21684], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21691], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699], [CVE-2025-21943], [CVE-2025-2312] |
USN-7595-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75951000000 |
false |
patch |
[USN-7595-1], [CVE-2024-50157], [CVE-2024-53124], [CVE-2024-57924], [CVE-2024-57948], [CVE-2024-57949], [CVE-2024-57951], [CVE-2024-57952], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21667], [CVE-2025-21668], [CVE-2025-21669], [CVE-2025-21670], [CVE-2025-21672], [CVE-2025-21673], [CVE-2025-21674], [CVE-2025-21675], [CVE-2025-21676], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21681], [CVE-2025-21682], [CVE-2025-21683], [CVE-2025-21684], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21691], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699], [CVE-2025-21943], [CVE-2025-2312] |
USN-7595-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75916000000 |
false |
patch |
[USN-7591-6], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-6 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:75915000000 |
false |
patch |
[USN-7591-5], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-5 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:75914000000 |
false |
patch |
[USN-7591-4], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-4 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75913000000 |
false |
patch |
[USN-7591-3], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:75912000000 |
false |
patch |
[USN-7591-2], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75911000000 |
false |
patch |
[USN-7591-1], [CVE-2022-49636], [CVE-2022-49728], [CVE-2023-53034], [CVE-2024-36945], [CVE-2024-42230], [CVE-2024-46753], [CVE-2024-46812], [CVE-2024-46821], [CVE-2024-53144], [CVE-2024-56664], [CVE-2024-58093], [CVE-2024-8805], [CVE-2025-21941], [CVE-2025-21956], [CVE-2025-21957], [CVE-2025-21959], [CVE-2025-21962], [CVE-2025-21963], [CVE-2025-21964], [CVE-2025-21968], [CVE-2025-21970], [CVE-2025-21975], [CVE-2025-21981], [CVE-2025-21991], [CVE-2025-21992], [CVE-2025-21994], [CVE-2025-21996], [CVE-2025-21999], [CVE-2025-22004], [CVE-2025-22005], [CVE-2025-22007], [CVE-2025-22008], [CVE-2025-22010], [CVE-2025-22014], [CVE-2025-22018], [CVE-2025-22020], [CVE-2025-22021], [CVE-2025-22025], [CVE-2025-22035], [CVE-2025-22044], [CVE-2025-22045], [CVE-2025-22050], [CVE-2025-22054], [CVE-2025-22055], [CVE-2025-22056], [CVE-2025-22060], [CVE-2025-22063], [CVE-2025-22066], [CVE-2025-22071], [CVE-2025-22073], [CVE-2025-22075], [CVE-2025-22079], [CVE-2025-22081], [CVE-2025-22086], [CVE-2025-22089], [CVE-2025-22097], [CVE-2025-2312], [CVE-2025-23136], [CVE-2025-23138], [CVE-2025-37785], [CVE-2025-37889], [CVE-2025-37937], [CVE-2025-38152], [CVE-2025-38575], [CVE-2025-38637], [CVE-2025-39728], [CVE-2025-39735] |
USN-7591-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75881000000 |
false |
patch |
[USN-7588-1], [CVE-2023-25567], [CVE-2023-25565], [CVE-2023-25564], [CVE-2023-25563] |
USN-7588-1 -- GSS NTLMSSP vulnerabilities |
| oval:com.ubuntu.jammy:def:75871000000 |
false |
patch |
[USN-7587-1], [CVE-2020-21680], [CVE-2025-31162], [CVE-2020-21682], [CVE-2025-31163], [CVE-2025-31164], [CVE-2020-21683] |
USN-7587-1 -- Fig2dev vulnerabilities |
| oval:com.ubuntu.jammy:def:75861000000 |
false |
patch |
[USN-7586-1], [CVE-2024-34703], [CVE-2024-39312], [CVE-2024-34702], [CVE-2024-50383], [CVE-2024-50382] |
USN-7586-1 -- Botan vulnerabilities |
| oval:com.ubuntu.jammy:def:75841000000 |
false |
patch |
[USN-7584-1], [CVE-2025-49113] |
USN-7584-1 -- Roundcube vulnerability |
| oval:com.ubuntu.jammy:def:75811000000 |
false |
patch |
[USN-7581-1], [CVE-2024-29041], [CVE-2024-43796] |
USN-7581-1 -- Express vulnerabilities |
| oval:com.ubuntu.jammy:def:75801000000 |
false |
patch |
[USN-7580-1], [CVE-2025-6020] |
USN-7580-1 -- PAM vulnerability |
| oval:com.ubuntu.jammy:def:75791000000 |
false |
patch |
[USN-7579-1], [CVE-2019-2126], [CVE-2021-26826], [CVE-2021-26825] |
USN-7579-1 -- Godot Engine vulnerabilities |
| oval:com.ubuntu.jammy:def:75781000000 |
false |
patch |
[USN-7578-1], [CVE-2025-6019] |
USN-7578-1 -- UDisks vulnerability |
| oval:com.ubuntu.jammy:def:75771000000 |
false |
patch |
[USN-7577-1], [CVE-2025-6019] |
USN-7577-1 -- libblockdev vulnerability |
| oval:com.ubuntu.jammy:def:75761000000 |
false |
patch |
[USN-7576-1], [CVE-2022-32200] |
USN-7576-1 -- dwarfutils vulnerabilities |
| oval:com.ubuntu.jammy:def:75751000000 |
false |
patch |
[USN-7575-1], [CVE-2022-30974], [CVE-2021-45005], [CVE-2022-30975] |
USN-7575-1 -- MuJS vulnerabilities |
| oval:com.ubuntu.jammy:def:75741000000 |
false |
patch |
[USN-7574-1], [CVE-2024-45336], [CVE-2025-22866], [CVE-2025-4673], [CVE-2025-22870], [CVE-2024-45341] |
USN-7574-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:75731000000 |
false |
patch |
[USN-7573-1], [CVE-2025-49175], [CVE-2025-49176], [CVE-2025-49177], [CVE-2025-49178], [CVE-2025-49179], [CVE-2025-49180] |
USN-7573-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:75721000000 |
false |
patch |
[USN-7572-1], [CVE-2024-28246], [CVE-2024-28245], [CVE-2025-23207], [CVE-2024-28243] |
USN-7572-1 -- KaTeX vulnerabilities |
| oval:com.ubuntu.jammy:def:75701000000 |
false |
patch |
[USN-7570-1], [CVE-2025-4516], [CVE-2025-1795] |
USN-7570-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:75691000000 |
false |
patch |
[USN-7569-1], [CVE-2021-23450], [CVE-2020-4051], [CVE-2019-10785], [CVE-2018-15494] |
USN-7569-1 -- Dojo vulnerabilities |
| oval:com.ubuntu.jammy:def:75681000000 |
false |
patch |
[USN-7568-1], [CVE-2024-47081], [CVE-2023-32681] |
USN-7568-1 -- Requests vulnerabilities |
| oval:com.ubuntu.jammy:def:75671000000 |
false |
patch |
[USN-7567-1], [CVE-2025-47947], [CVE-2025-48866] |
USN-7567-1 -- ModSecurity vulnerabilities |
| oval:com.ubuntu.jammy:def:75661000000 |
false |
patch |
[USN-7566-1], [CVE-2025-24223], [CVE-2025-31215], [CVE-2025-31257], [CVE-2025-31206], [CVE-2025-31205], [CVE-2025-31204] |
USN-7566-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:75631000000 |
false |
patch |
[USN-7563-1], [CVE-2025-30399] |
USN-7563-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:75621000000 |
false |
patch |
[USN-7562-1], [CVE-2024-24549], [CVE-2024-34750], [CVE-2024-23672], [CVE-2023-42795], [CVE-2024-38286], [CVE-2023-45648], [CVE-2023-28708], [CVE-2024-21733] |
USN-7562-1 -- Tomcat vulnerabilities |
| oval:com.ubuntu.jammy:def:75591000000 |
false |
patch |
[USN-7559-1], [CVE-2025-4598] |
USN-7559-1 -- systemd vulnerability |
| oval:com.ubuntu.jammy:def:75561000000 |
false |
patch |
[USN-7556-1], [CVE-2024-6484], [CVE-2024-6531], [CVE-2024-6485] |
USN-7556-1 -- Bootstrap vulnerabilities |
| oval:com.ubuntu.jammy:def:75552000000 |
false |
patch |
[USN-7555-2] |
USN-7555-2 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:75551000000 |
false |
patch |
[USN-7555-1], [CVE-2025-48432] |
USN-7555-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:75521000000 |
false |
patch |
[USN-7552-1], [CVE-2021-4185], [CVE-2022-0582], [CVE-2022-0586], [CVE-2022-3190], [CVE-2021-4182], [CVE-2022-0585], [CVE-2021-39929], [CVE-2021-4186], [CVE-2022-0581], [CVE-2022-0583] |
USN-7552-1 -- Wireshark vulnerabilities |
| oval:com.ubuntu.jammy:def:75511000000 |
false |
patch |
[USN-7551-1], [CVE-2025-5283] |
USN-7551-1 -- libvpx vulnerability |
| oval:com.ubuntu.jammy:def:75507000000 |
false |
patch |
[USN-7550-7], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-7 -- Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
| oval:com.ubuntu.jammy:def:75506000000 |
false |
patch |
[USN-7550-6], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-6 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:75505000000 |
false |
patch |
[USN-7550-5], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-5 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:75504000000 |
false |
patch |
[USN-7550-4], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-4 -- Linux kernel (Azure CVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:75503000000 |
false |
patch |
[USN-7550-3], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-3 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75502000000 |
false |
patch |
[USN-7550-2], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-2 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:75501000000 |
false |
patch |
[USN-7550-1], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56608] |
USN-7550-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75471000000 |
false |
patch |
[USN-7547-1], [CVE-2025-47287] |
USN-7547-1 -- Tornado vulnerability |
| oval:com.ubuntu.jammy:def:75454000000 |
false |
patch |
[USN-7545-4] |
USN-7545-4 -- Apport regression |
| oval:com.ubuntu.jammy:def:75453000000 |
false |
patch |
[USN-7545-3] |
USN-7545-3 -- Apport regression |
| oval:com.ubuntu.jammy:def:75452000000 |
false |
patch |
[USN-7545-2] |
USN-7545-2 -- Apport regression |
| oval:com.ubuntu.jammy:def:75451000000 |
false |
patch |
[USN-7545-1], [CVE-2025-5054] |
USN-7545-1 -- Apport vulnerability |
| oval:com.ubuntu.jammy:def:75441000000 |
false |
patch |
[USN-7544-1], [CVE-2025-47273] |
USN-7544-1 -- Setuptools vulnerability |
| oval:com.ubuntu.jammy:def:75431000000 |
false |
patch |
[USN-7543-1], [CVE-2025-4476], [CVE-2025-32908] |
USN-7543-1 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:75421000000 |
false |
patch |
[USN-7542-1], [CVE-2025-3576] |
USN-7542-1 -- Kerberos vulnerability |
| oval:com.ubuntu.jammy:def:75411000000 |
false |
patch |
[USN-7541-1], [CVE-2025-4802] |
USN-7541-1 -- GNU C Library vulnerability |
| oval:com.ubuntu.jammy:def:75372000000 |
false |
patch |
[USN-7537-2] |
USN-7537-2 -- net-tools regression |
| oval:com.ubuntu.jammy:def:75371000000 |
false |
patch |
[USN-7537-1], [CVE-2025-46836] |
USN-7537-1 -- net-tools vulnerability |
| oval:com.ubuntu.jammy:def:75362000000 |
false |
patch |
[USN-7536-2] |
USN-7536-2 -- cifs-utils regression |
| oval:com.ubuntu.jammy:def:75361000000 |
false |
patch |
[USN-7536-1], [CVE-2025-2312] |
USN-7536-1 -- cifs-utils vulnerability |
| oval:com.ubuntu.jammy:def:75351000000 |
false |
patch |
[USN-7535-1], [CVE-2024-28956], [CVE-2024-43420], [CVE-2024-45332], [CVE-2025-20012], [CVE-2025-20054], [CVE-2025-20103], [CVE-2025-20623], [CVE-2025-24495] |
USN-7535-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:75321000000 |
false |
patch |
[USN-7532-1], [CVE-2025-4373] |
USN-7532-1 -- GLib vulnerability |
| oval:com.ubuntu.jammy:def:75291000000 |
false |
patch |
[USN-7529-1], [CVE-2022-33879], [CVE-2022-30126], [CVE-2022-30973], [CVE-2020-1950], [CVE-2020-1951] |
USN-7529-1 -- Apache Tika vulnerabilities |
| oval:com.ubuntu.jammy:def:75281000000 |
false |
patch |
[USN-7528-1], [CVE-2025-29087], [CVE-2025-29088], [CVE-2025-3277] |
USN-7528-1 -- SQLite vulnerabilities |
| oval:com.ubuntu.jammy:def:75251000000 |
false |
patch |
[USN-7525-1], [CVE-2025-24813] |
USN-7525-1 -- Tomcat vulnerability |
| oval:com.ubuntu.jammy:def:75201000000 |
false |
patch |
[USN-7520-1], [CVE-2025-4207] |
USN-7520-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:75191000000 |
false |
patch |
[USN-7519-1], [CVE-2023-52969], [CVE-2023-52970], [CVE-2025-30693], [CVE-2025-30722] |
USN-7519-1 -- MariaDB vulnerabilities |
| oval:com.ubuntu.jammy:def:75152000000 |
false |
patch |
[USN-7515-2], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-44964], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21938], [CVE-2025-21971] |
USN-7515-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75141000000 |
false |
patch |
[USN-7514-1], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21888], [CVE-2025-21938], [CVE-2025-21971] |
USN-7514-1 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:75135000000 |
false |
patch |
[USN-7513-5], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21938], [CVE-2025-21971] |
USN-7513-5 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:75134000000 |
false |
patch |
[USN-7513-4], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21938], [CVE-2025-21971] |
USN-7513-4 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:75133000000 |
false |
patch |
[USN-7513-3], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21938], [CVE-2025-21971] |
USN-7513-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75131000000 |
false |
patch |
[USN-7513-1], [CVE-2024-36476], [CVE-2024-38608], [CVE-2024-39282], [CVE-2024-41013], [CVE-2024-47408], [CVE-2024-47736], [CVE-2024-49568], [CVE-2024-49571], [CVE-2024-53125], [CVE-2024-53179], [CVE-2024-53685], [CVE-2024-53687], [CVE-2024-53690], [CVE-2024-54193], [CVE-2024-54455], [CVE-2024-54460], [CVE-2024-54683], [CVE-2024-55639], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56372], [CVE-2024-56652], [CVE-2024-56654], [CVE-2024-56656], [CVE-2024-56657], [CVE-2024-56659], [CVE-2024-56660], [CVE-2024-56662], [CVE-2024-56664], [CVE-2024-56665], [CVE-2024-56667], [CVE-2024-56670], [CVE-2024-56675], [CVE-2024-56709], [CVE-2024-56710], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56717], [CVE-2024-56718], [CVE-2024-56758], [CVE-2024-56759], [CVE-2024-56760], [CVE-2024-56761], [CVE-2024-56763], [CVE-2024-56764], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57793], [CVE-2024-57801], [CVE-2024-57802], [CVE-2024-57804], [CVE-2024-57805], [CVE-2024-57806], [CVE-2024-57807], [CVE-2024-57841], [CVE-2024-57879], [CVE-2024-57882], [CVE-2024-57883], [CVE-2024-57884], [CVE-2024-57885], [CVE-2024-57887], [CVE-2024-57888], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57893], [CVE-2024-57895], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57898], [CVE-2024-57899], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57916], [CVE-2024-57917], [CVE-2024-57925], [CVE-2024-57926], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57932], [CVE-2024-57933], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57945], [CVE-2024-57946], [CVE-2024-58087], [CVE-2024-58237], [CVE-2025-21631], [CVE-2025-21632], [CVE-2025-21634], [CVE-2025-21635], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21642], [CVE-2025-21643], [CVE-2025-21645], [CVE-2025-21646], [CVE-2025-21647], [CVE-2025-21648], [CVE-2025-21649], [CVE-2025-21650], [CVE-2025-21651], [CVE-2025-21652], [CVE-2025-21653], [CVE-2025-21654], [CVE-2025-21655], [CVE-2025-21656], [CVE-2025-21658], [CVE-2025-21659], [CVE-2025-21660], [CVE-2025-21662], [CVE-2025-21663], [CVE-2025-21664], [CVE-2025-21938], [CVE-2025-21971] |
USN-7513-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75113000000 |
false |
patch |
[USN-7511-3], [CVE-2024-26982], [CVE-2024-35889], [CVE-2024-44964], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7511-3 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:75112000000 |
false |
patch |
[USN-7511-2], [CVE-2024-26982], [CVE-2024-35889], [CVE-2024-44964], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7511-2 -- Linux kernel (GCP FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75111000000 |
false |
patch |
[USN-7511-1], [CVE-2024-26982], [CVE-2024-35889], [CVE-2024-44964], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7511-1 -- Linux kernel (GCP) vulnerabilities |
| oval:com.ubuntu.jammy:def:75107000000 |
false |
patch |
[USN-7510-7], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-7 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75106000000 |
false |
patch |
[USN-7510-6], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-6 -- Linux kernel (AWS FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75105000000 |
false |
patch |
[USN-7510-5], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-5 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75104000000 |
false |
patch |
[USN-7510-4], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-4 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:75103000000 |
false |
patch |
[USN-7510-3], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75102000000 |
false |
patch |
[USN-7510-2], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:75101000000 |
false |
patch |
[USN-7510-1], [CVE-2024-26982], [CVE-2024-47726], [CVE-2024-56599], [CVE-2024-56721], [CVE-2024-57834], [CVE-2024-57973], [CVE-2024-57977], [CVE-2024-57978], [CVE-2024-57979], [CVE-2024-57980], [CVE-2024-57981], [CVE-2024-57986], [CVE-2024-58001], [CVE-2024-58002], [CVE-2024-58005], [CVE-2024-58007], [CVE-2024-58010], [CVE-2024-58014], [CVE-2024-58016], [CVE-2024-58017], [CVE-2024-58020], [CVE-2024-58034], [CVE-2024-58051], [CVE-2024-58052], [CVE-2024-58055], [CVE-2024-58058], [CVE-2024-58063], [CVE-2024-58069], [CVE-2024-58071], [CVE-2024-58072], [CVE-2024-58076], [CVE-2024-58079], [CVE-2024-58083], [CVE-2024-58085], [CVE-2024-58086], [CVE-2024-58090], [CVE-2025-21647], [CVE-2025-21684], [CVE-2025-21704], [CVE-2025-21707], [CVE-2025-21708], [CVE-2025-21711], [CVE-2025-21715], [CVE-2025-21718], [CVE-2025-21719], [CVE-2025-21721], [CVE-2025-21722], [CVE-2025-21726], [CVE-2025-21727], [CVE-2025-21728], [CVE-2025-21731], [CVE-2025-21735], [CVE-2025-21736], [CVE-2025-21744], [CVE-2025-21745], [CVE-2025-21748], [CVE-2025-21749], [CVE-2025-21753], [CVE-2025-21758], [CVE-2025-21760], [CVE-2025-21761], [CVE-2025-21762], [CVE-2025-21763], [CVE-2025-21764], [CVE-2025-21765], [CVE-2025-21766], [CVE-2025-21767], [CVE-2025-21772], [CVE-2025-21776], [CVE-2025-21779], [CVE-2025-21781], [CVE-2025-21782], [CVE-2025-21785], [CVE-2025-21787], [CVE-2025-21791], [CVE-2025-21795], [CVE-2025-21796], [CVE-2025-21799], [CVE-2025-21802], [CVE-2025-21804], [CVE-2025-21806], [CVE-2025-21811], [CVE-2025-21814], [CVE-2025-21820], [CVE-2025-21823], [CVE-2025-21826], [CVE-2025-21830], [CVE-2025-21835], [CVE-2025-21844], [CVE-2025-21846], [CVE-2025-21848], [CVE-2025-21858], [CVE-2025-21859], [CVE-2025-21862], [CVE-2025-21865], [CVE-2025-21866], [CVE-2025-21871], [CVE-2025-21875], [CVE-2025-21877], [CVE-2025-21878], [CVE-2025-21887], [CVE-2025-21898], [CVE-2025-21904], [CVE-2025-21905], [CVE-2025-21909], [CVE-2025-21910], [CVE-2025-21912], [CVE-2025-21914], [CVE-2025-21916], [CVE-2025-21917], [CVE-2025-21919], [CVE-2025-21920], [CVE-2025-21922], [CVE-2025-21924], [CVE-2025-21925], [CVE-2025-21926], [CVE-2025-21928], [CVE-2025-21934], [CVE-2025-21935], [CVE-2025-21943], [CVE-2025-21948], [CVE-2025-21950], [CVE-2025-21951], [CVE-2025-21971] |
USN-7510-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:75091000000 |
false |
patch |
[USN-7509-1], [CVE-2025-26646] |
USN-7509-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:75081000000 |
false |
patch |
[USN-7508-1], [CVE-2025-22247] |
USN-7508-1 -- Open VM Tools vulnerability |
| oval:com.ubuntu.jammy:def:75071000000 |
false |
patch |
[USN-7507-1], [CVE-2025-46727], [CVE-2025-32441] |
USN-7507-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:75051000000 |
false |
patch |
[USN-7505-1], [CVE-2025-0838] |
USN-7505-1 -- Abseil vulnerability |
| oval:com.ubuntu.jammy:def:75041000000 |
false |
patch |
[USN-7504-1], [CVE-2025-2866] |
USN-7504-1 -- LibreOffice vulnerability |
| oval:com.ubuntu.jammy:def:75011000000 |
false |
patch |
[USN-7501-1], [CVE-2025-32873] |
USN-7501-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:75002000000 |
false |
patch |
[USN-7500-2], [CVE-2024-56653], [CVE-2025-21953] |
USN-7500-2 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:74971000000 |
false |
patch |
[USN-7497-1], [CVE-2021-21305], [CVE-2023-49090] |
USN-7497-1 -- CarrierWave vulnerabilities |
| oval:com.ubuntu.jammy:def:74945000000 |
false |
patch |
[USN-7494-5], [CVE-2023-52664], [CVE-2023-52927] |
USN-7494-5 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74944000000 |
false |
patch |
[USN-7494-4], [CVE-2023-52664], [CVE-2023-52927] |
USN-7494-4 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:74943000000 |
false |
patch |
[USN-7494-3], [CVE-2023-52664], [CVE-2023-52927] |
USN-7494-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:74942000000 |
false |
patch |
[USN-7494-2], [CVE-2023-52664], [CVE-2023-52927] |
USN-7494-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74941000000 |
false |
patch |
[USN-7494-1], [CVE-2023-52664], [CVE-2023-52927] |
USN-7494-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74921000000 |
false |
patch |
[USN-7492-1], [CVE-2024-56653] |
USN-7492-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:74903000000 |
false |
patch |
[USN-7490-3], [CVE-2025-32906], [CVE-2025-32909], [CVE-2025-32910], [CVE-2025-32911], [CVE-2025-32912], [CVE-2025-32913], [CVE-2025-32914], [CVE-2025-46420], [CVE-2025-46421] |
USN-7490-3 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:74902000000 |
false |
patch |
[USN-7490-2], [CVE-2025-32912] |
USN-7490-2 -- libsoup regression |
| oval:com.ubuntu.jammy:def:74901000000 |
false |
patch |
[USN-7490-1], [CVE-2025-32906], [CVE-2025-32909], [CVE-2025-32910], [CVE-2025-32911], [CVE-2025-32912], [CVE-2025-32913], [CVE-2025-32914], [CVE-2025-46420], [CVE-2025-46421] |
USN-7490-1 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:74881000000 |
false |
patch |
[USN-7488-1], [CVE-2024-11168], [CVE-2024-6232], [CVE-2024-9287] |
USN-7488-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:74861000000 |
false |
patch |
[USN-7486-1], [CVE-2025-23016] |
USN-7486-1 -- FastCGI vulnerability |
| oval:com.ubuntu.jammy:def:74851000000 |
false |
patch |
[USN-7485-1], [CVE-2025-43961], [CVE-2025-43962], [CVE-2025-43963], [CVE-2025-43964] |
USN-7485-1 -- LibRaw vulnerabilities |
| oval:com.ubuntu.jammy:def:74831000000 |
false |
patch |
[USN-7483-1], [CVE-2025-21587], [CVE-2025-30691], [CVE-2025-30698] |
USN-7483-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:74821000000 |
false |
patch |
[USN-7482-1], [CVE-2025-21587], [CVE-2025-30691], [CVE-2025-30698] |
USN-7482-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:74811000000 |
false |
patch |
[USN-7481-1], [CVE-2025-21587], [CVE-2025-30691], [CVE-2025-30698] |
USN-7481-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:74801000000 |
false |
patch |
[USN-7480-1], [CVE-2025-21587], [CVE-2025-30691], [CVE-2025-30698] |
USN-7480-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:74791000000 |
false |
patch |
[USN-7479-1], [CVE-2025-21574], [CVE-2025-21575], [CVE-2025-21577], [CVE-2025-21579], [CVE-2025-21580], [CVE-2025-21581], [CVE-2025-21584], [CVE-2025-21585], [CVE-2025-21588], [CVE-2025-30681], [CVE-2025-30682], [CVE-2025-30683], [CVE-2025-30684], [CVE-2025-30685], [CVE-2025-30687], [CVE-2025-30688], [CVE-2025-30689], [CVE-2025-30693], [CVE-2025-30695], [CVE-2025-30696], [CVE-2025-30699], [CVE-2025-30703], [CVE-2025-30704], [CVE-2025-30705], [CVE-2025-30715], [CVE-2025-30721], [CVE-2025-30722] |
USN-7479-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:74781000000 |
false |
patch |
[USN-7478-1], [CVE-2025-30472] |
USN-7478-1 -- Corosync vulnerability |
| oval:com.ubuntu.jammy:def:74761000000 |
false |
patch |
[USN-7476-1], [CVE-2021-41125], [CVE-2022-0577], [CVE-2024-1892], [CVE-2024-1968], [CVE-2024-3572], [CVE-2024-3574] |
USN-7476-1 -- Scrapy vulnerabilities |
| oval:com.ubuntu.jammy:def:74751000000 |
false |
patch |
[USN-7475-1], [CVE-2022-0995], [CVE-2024-26837], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-46826], [CVE-2024-50248], [CVE-2024-50256], [CVE-2024-56651], [CVE-2024-56658], [CVE-2024-57798], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21703], [CVE-2025-21756], [CVE-2025-21993] |
USN-7475-1 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:74741000000 |
false |
patch |
[USN-7474-1], [CVE-2023-28840], [CVE-2023-28841], [CVE-2023-28842], [CVE-2024-23651], [CVE-2024-23652], [CVE-2024-36621], [CVE-2024-36623] |
USN-7474-1 -- Docker vulnerabilities |
| oval:com.ubuntu.jammy:def:74721000000 |
false |
patch |
[USN-7472-1], [CVE-2021-42553], [CVE-2024-8946], [CVE-2024-8947] |
USN-7472-1 -- Micropython vulnerabilities |
| oval:com.ubuntu.jammy:def:74711000000 |
false |
patch |
[USN-7471-1], [CVE-2025-43903] |
USN-7471-1 -- poppler vulnerabilities |
| oval:com.ubuntu.jammy:def:74693000000 |
false |
patch |
[USN-7469-3], [CVE-2023-44487] |
USN-7469-3 -- Node.js vulnerability |
| oval:com.ubuntu.jammy:def:74691000000 |
false |
patch |
[USN-7469-1], [CVE-2023-44487] |
USN-7469-1 -- Apache Traffic Server vulnerability |
| oval:com.ubuntu.jammy:def:74671000000 |
false |
patch |
[USN-7467-1], [CVE-2025-32414], [CVE-2025-32415] |
USN-7467-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:74641000000 |
false |
patch |
[USN-7464-1], [CVE-2022-25887] |
USN-7464-1 -- Jupyter Notebook vulnerability |
| oval:com.ubuntu.jammy:def:74601000000 |
false |
patch |
[USN-7460-1], [CVE-2022-0995], [CVE-2024-26837], [CVE-2024-42069], [CVE-2024-46826], [CVE-2024-50248], [CVE-2024-50256], [CVE-2024-56651], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21703], [CVE-2025-21756], [CVE-2025-21993] |
USN-7460-1 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74571000000 |
false |
patch |
[USN-7457-1], [CVE-2025-32728] |
USN-7457-1 -- OpenSSH vulnerability |
| oval:com.ubuntu.jammy:def:74561000000 |
false |
patch |
[USN-7456-1], [CVE-2024-45411], [CVE-2024-51754] |
USN-7456-1 -- Twig vulnerabilities |
| oval:com.ubuntu.jammy:def:74553000000 |
false |
patch |
[USN-7455-3], [CVE-2022-0995], [CVE-2024-26837], [CVE-2024-46826], [CVE-2024-50248], [CVE-2024-50256], [CVE-2024-56651], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21703], [CVE-2025-21756], [CVE-2025-21993] |
USN-7455-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:74552000000 |
false |
patch |
[USN-7455-2], [CVE-2022-0995], [CVE-2024-26837], [CVE-2024-46826], [CVE-2024-50248], [CVE-2024-50256], [CVE-2024-56651], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21703], [CVE-2025-21756], [CVE-2025-21993] |
USN-7455-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74551000000 |
false |
patch |
[USN-7455-1], [CVE-2022-0995], [CVE-2024-26837], [CVE-2024-46826], [CVE-2024-50248], [CVE-2024-50256], [CVE-2024-56651], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21703], [CVE-2025-21756], [CVE-2025-21993] |
USN-7455-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74541000000 |
false |
patch |
[USN-7454-1], [CVE-2025-1632], [CVE-2025-25724] |
USN-7454-1 -- libarchive vulnerabilities |
| oval:com.ubuntu.jammy:def:74521000000 |
false |
patch |
[USN-7452-1], [CVE-2022-49034], [CVE-2024-41014], [CVE-2024-41932], [CVE-2024-41935], [CVE-2024-42122], [CVE-2024-43098], [CVE-2024-44955], [CVE-2024-45828], [CVE-2024-47141], [CVE-2024-47143], [CVE-2024-47794], [CVE-2024-47809], [CVE-2024-48873], [CVE-2024-48875], [CVE-2024-48876], [CVE-2024-48881], [CVE-2024-49569], [CVE-2024-49899], [CVE-2024-49906], [CVE-2024-50010], [CVE-2024-50051], [CVE-2024-50067], [CVE-2024-50103], [CVE-2024-50104], [CVE-2024-50105], [CVE-2024-50107], [CVE-2024-50108], [CVE-2024-50110], [CVE-2024-50111], [CVE-2024-50112], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50118], [CVE-2024-50120], [CVE-2024-50121], [CVE-2024-50124], [CVE-2024-50125], [CVE-2024-50126], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50130], [CVE-2024-50131], [CVE-2024-50133], [CVE-2024-50135], [CVE-2024-50136], [CVE-2024-50137], [CVE-2024-50138], [CVE-2024-50139], [CVE-2024-50140], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50145], [CVE-2024-50146], [CVE-2024-50147], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50152], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50155], [CVE-2024-50156], [CVE-2024-50158], [CVE-2024-50159], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50164], [CVE-2024-50166], [CVE-2024-50167], [CVE-2024-50169], [CVE-2024-50170], [CVE-2024-50172], [CVE-2024-50203], [CVE-2024-50205], [CVE-2024-50206], [CVE-2024-50207], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50210], [CVE-2024-50211], [CVE-2024-50215], [CVE-2024-50216], [CVE-2024-50218], [CVE-2024-50220], [CVE-2024-50221], [CVE-2024-50222], [CVE-2024-50223], [CVE-2024-50224], [CVE-2024-50225], [CVE-2024-50226], [CVE-2024-50230], [CVE-2024-50231], [CVE-2024-50232], [CVE-2024-50234], [CVE-2024-50235], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50238], [CVE-2024-50239], [CVE-2024-50240], [CVE-2024-50242], [CVE-2024-50243], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50246], [CVE-2024-50247], [CVE-2024-50248], [CVE-2024-50249], [CVE-2024-50250], [CVE-2024-50251], [CVE-2024-50252], [CVE-2024-50255], [CVE-2024-50256], [CVE-2024-50257], [CVE-2024-50258], [CVE-2024-50259], [CVE-2024-50261], [CVE-2024-50262], [CVE-2024-50263], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50270], [CVE-2024-50271], [CVE-2024-50272], [CVE-2024-50273], [CVE-2024-50275], [CVE-2024-50276], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50280], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50284], [CVE-2024-50285], [CVE-2024-50286], [CVE-2024-50287], [CVE-2024-50288], [CVE-2024-50289], [CVE-2024-50290], [CVE-2024-50291], [CVE-2024-50292], [CVE-2024-50294], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50297], [CVE-2024-50298], [CVE-2024-50299], [CVE-2024-50300], [CVE-2024-50301], [CVE-2024-50303], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53043], [CVE-2024-53044], [CVE-2024-53045], [CVE-2024-53046], [CVE-2024-53047], [CVE-2024-53048], [CVE-2024-53050], [CVE-2024-53051], [CVE-2024-53052], [CVE-2024-53053], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53060], [CVE-2024-53061], [CVE-2024-53062], [CVE-2024-53066], [CVE-2024-53067], [CVE-2024-53068], [CVE-2024-53072], [CVE-2024-53076], [CVE-2024-53079], [CVE-2024-53081], [CVE-2024-53082], [CVE-2024-53083], [CVE-2024-53084], [CVE-2024-53085], [CVE-2024-53086], [CVE-2024-53087], [CVE-2024-53088], [CVE-2024-53089], [CVE-2024-53090], [CVE-2024-53091], [CVE-2024-53093], [CVE-2024-53094], [CVE-2024-53095], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53100], [CVE-2024-53101], [CVE-2024-53105], [CVE-2024-53106], [CVE-2024-53107], [CVE-2024-53108], [CVE-2024-53109], [CVE-2024-53110], [CVE-2024-53111], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53114], [CVE-2024-53115], [CVE-2024-53117], [CVE-2024-53118], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53123], [CVE-2024-53126], [CVE-2024-53127], [CVE-2024-53128], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53133], [CVE-2024-53134], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53139], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53147], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53154], [CVE-2024-53155], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53160], [CVE-2024-53161], [CVE-2024-53162], [CVE-2024-53163], [CVE-2024-53166], [CVE-2024-53168], [CVE-2024-53169], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53175], [CVE-2024-53176], [CVE-2024-53177], [CVE-2024-53178], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53185], [CVE-2024-53187], [CVE-2024-53188], [CVE-2024-53190], [CVE-2024-53191], [CVE-2024-53194], [CVE-2024-53195], [CVE-2024-53196], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53200], [CVE-2024-53201], [CVE-2024-53202], [CVE-2024-53203], [CVE-2024-53208], [CVE-2024-53209], [CVE-2024-53210], [CVE-2024-53213], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53218], [CVE-2024-53219], [CVE-2024-53220], [CVE-2024-53221], [CVE-2024-53222], [CVE-2024-53223], [CVE-2024-53224], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53228], [CVE-2024-53229], [CVE-2024-53230], [CVE-2024-53231], [CVE-2024-53232], [CVE-2024-53233], [CVE-2024-53234], [CVE-2024-53236], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56538], [CVE-2024-56539], [CVE-2024-56540], [CVE-2024-56543], [CVE-2024-56545], [CVE-2024-56546], [CVE-2024-56548], [CVE-2024-56549], [CVE-2024-56550], [CVE-2024-56551], [CVE-2024-56557], [CVE-2024-56558], [CVE-2024-56561], [CVE-2024-56562], [CVE-2024-56565], [CVE-2024-56566], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56573], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56577], [CVE-2024-56578], [CVE-2024-56579], [CVE-2024-56580], [CVE-2024-56581], [CVE-2024-56583], [CVE-2024-56584], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56588], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56592], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56599], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56604], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56607], [CVE-2024-56608], [CVE-2024-56609], [CVE-2024-56610], [CVE-2024-56611], [CVE-2024-56613], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56620], [CVE-2024-56621], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56632], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56635], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56638], [CVE-2024-56640], [CVE-2024-56641], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56647], [CVE-2024-56648], [CVE-2024-56649], [CVE-2024-56650], [CVE-2024-56651], [CVE-2024-56677], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56683], [CVE-2024-56685], [CVE-2024-56687], [CVE-2024-56688], [CVE-2024-56689], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56692], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56703], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56707], [CVE-2024-56708], [CVE-2024-56720], [CVE-2024-56721], [CVE-2024-56722], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56725], [CVE-2024-56726], [CVE-2024-56727], [CVE-2024-56728], [CVE-2024-56729], [CVE-2024-56739], [CVE-2024-56742], [CVE-2024-56744], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56751], [CVE-2024-56752], [CVE-2024-56754], [CVE-2024-56755], [CVE-2024-56756], [CVE-2024-56765], [CVE-2024-56771], [CVE-2024-56772], [CVE-2024-56773], [CVE-2024-56774], [CVE-2024-56775], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56782], [CVE-2024-56783], [CVE-2024-56785], [CVE-2024-56786], [CVE-2024-56787], [CVE-2024-57838], [CVE-2024-57843], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57872], [CVE-2024-57874], [CVE-2024-57876], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21756], [CVE-2025-21831], [CVE-2025-21993] |
USN-7452-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74511000000 |
false |
patch |
[USN-7451-1], [CVE-2022-49034], [CVE-2024-41014], [CVE-2024-41932], [CVE-2024-41935], [CVE-2024-42122], [CVE-2024-43098], [CVE-2024-44955], [CVE-2024-45828], [CVE-2024-47141], [CVE-2024-47143], [CVE-2024-47711], [CVE-2024-47726], [CVE-2024-47794], [CVE-2024-47809], [CVE-2024-48873], [CVE-2024-48875], [CVE-2024-48876], [CVE-2024-48881], [CVE-2024-49569], [CVE-2024-49865], [CVE-2024-49893], [CVE-2024-49899], [CVE-2024-49906], [CVE-2024-49914], [CVE-2024-49920], [CVE-2024-49921], [CVE-2024-49968], [CVE-2024-49972], [CVE-2024-50009], [CVE-2024-50010], [CVE-2024-50019], [CVE-2024-50020], [CVE-2024-50021], [CVE-2024-50022], [CVE-2024-50023], [CVE-2024-50024], [CVE-2024-50025], [CVE-2024-50026], [CVE-2024-50027], [CVE-2024-50028], [CVE-2024-50029], [CVE-2024-50030], [CVE-2024-50031], [CVE-2024-50032], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50036], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50042], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50047], [CVE-2024-50048], [CVE-2024-50049], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50056], [CVE-2024-50057], [CVE-2024-50058], [CVE-2024-50059], [CVE-2024-50060], [CVE-2024-50061], [CVE-2024-50062], [CVE-2024-50063], [CVE-2024-50064], [CVE-2024-50065], [CVE-2024-50066], [CVE-2024-50067], [CVE-2024-50068], [CVE-2024-50069], [CVE-2024-50070], [CVE-2024-50072], [CVE-2024-50073], [CVE-2024-50074], [CVE-2024-50075], [CVE-2024-50076], [CVE-2024-50077], [CVE-2024-50078], [CVE-2024-50080], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50084], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50087], [CVE-2024-50088], [CVE-2024-50090], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50098], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50104], [CVE-2024-50105], [CVE-2024-50107], [CVE-2024-50108], [CVE-2024-50110], [CVE-2024-50111], [CVE-2024-50112], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50118], [CVE-2024-50120], [CVE-2024-50121], [CVE-2024-50124], [CVE-2024-50125], [CVE-2024-50126], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50130], [CVE-2024-50131], [CVE-2024-50133], [CVE-2024-50134], [CVE-2024-50135], [CVE-2024-50136], [CVE-2024-50137], [CVE-2024-50138], [CVE-2024-50139], [CVE-2024-50140], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50145], [CVE-2024-50146], [CVE-2024-50147], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50152], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50155], [CVE-2024-50156], [CVE-2024-50158], [CVE-2024-50159], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50164], [CVE-2024-50166], [CVE-2024-50167], [CVE-2024-50169], [CVE-2024-50170], [CVE-2024-50171], [CVE-2024-50172], [CVE-2024-50180], [CVE-2024-50182], [CVE-2024-50183], [CVE-2024-50184], [CVE-2024-50185], [CVE-2024-50186], [CVE-2024-50187], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50197], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50200], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50203], [CVE-2024-50205], [CVE-2024-50206], [CVE-2024-50207], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50210], [CVE-2024-50211], [CVE-2024-50215], [CVE-2024-50216], [CVE-2024-50218], [CVE-2024-50220], [CVE-2024-50221], [CVE-2024-50222], [CVE-2024-50223], [CVE-2024-50224], [CVE-2024-50225], [CVE-2024-50226], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50231], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50235], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50238], [CVE-2024-50239], [CVE-2024-50240], [CVE-2024-50242], [CVE-2024-50243], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50246], [CVE-2024-50247], [CVE-2024-50248], [CVE-2024-50249], [CVE-2024-50250], [CVE-2024-50251], [CVE-2024-50252], [CVE-2024-50255], [CVE-2024-50256], [CVE-2024-50257], [CVE-2024-50258], [CVE-2024-50259], [CVE-2024-50261], [CVE-2024-50262], [CVE-2024-50263], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50270], [CVE-2024-50271], [CVE-2024-50272], [CVE-2024-50273], [CVE-2024-50274], [CVE-2024-50275], [CVE-2024-50276], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50280], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50284], [CVE-2024-50285], [CVE-2024-50286], [CVE-2024-50287], [CVE-2024-50288], [CVE-2024-50289], [CVE-2024-50290], [CVE-2024-50291], [CVE-2024-50292], [CVE-2024-50294], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50297], [CVE-2024-50298], [CVE-2024-50299], [CVE-2024-50300], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-50303], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53043], [CVE-2024-53044], [CVE-2024-53045], [CVE-2024-53046], [CVE-2024-53047], [CVE-2024-53048], [CVE-2024-53050], [CVE-2024-53051], [CVE-2024-53052], [CVE-2024-53053], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53060], [CVE-2024-53061], [CVE-2024-53062], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53067], [CVE-2024-53068], [CVE-2024-53072], [CVE-2024-53076], [CVE-2024-53079], [CVE-2024-53081], [CVE-2024-53082], [CVE-2024-53083], [CVE-2024-53084], [CVE-2024-53085], [CVE-2024-53086], [CVE-2024-53087], [CVE-2024-53088], [CVE-2024-53089], [CVE-2024-53090], [CVE-2024-53091], [CVE-2024-53093], [CVE-2024-53094], [CVE-2024-53095], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53100], [CVE-2024-53101], [CVE-2024-53105], [CVE-2024-53106], [CVE-2024-53107], [CVE-2024-53108], [CVE-2024-53109], [CVE-2024-53110], [CVE-2024-53111], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53114], [CVE-2024-53115], [CVE-2024-53117], [CVE-2024-53118], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53123], [CVE-2024-53126], [CVE-2024-53127], [CVE-2024-53128], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53133], [CVE-2024-53134], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53139], [CVE-2024-53140], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53147], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53154], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53160], [CVE-2024-53161], [CVE-2024-53162], [CVE-2024-53163], [CVE-2024-53165], [CVE-2024-53166], [CVE-2024-53168], [CVE-2024-53169], [CVE-2024-53170], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53175], [CVE-2024-53176], [CVE-2024-53177], [CVE-2024-53178], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53185], [CVE-2024-53187], [CVE-2024-53188], [CVE-2024-53190], [CVE-2024-53191], [CVE-2024-53194], [CVE-2024-53195], [CVE-2024-53196], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53200], [CVE-2024-53201], [CVE-2024-53202], [CVE-2024-53203], [CVE-2024-53208], [CVE-2024-53209], [CVE-2024-53210], [CVE-2024-53213], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53218], [CVE-2024-53219], [CVE-2024-53220], [CVE-2024-53221], [CVE-2024-53222], [CVE-2024-53223], [CVE-2024-53224], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53228], [CVE-2024-53229], [CVE-2024-53230], [CVE-2024-53231], [CVE-2024-53232], [CVE-2024-53233], [CVE-2024-53234], [CVE-2024-53236], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56538], [CVE-2024-56539], [CVE-2024-56540], [CVE-2024-56543], [CVE-2024-56545], [CVE-2024-56546], [CVE-2024-56548], [CVE-2024-56549], [CVE-2024-56550], [CVE-2024-56551], [CVE-2024-56557], [CVE-2024-56558], [CVE-2024-56561], [CVE-2024-56562], [CVE-2024-56565], [CVE-2024-56566], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56573], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56577], [CVE-2024-56578], [CVE-2024-56579], [CVE-2024-56580], [CVE-2024-56581], [CVE-2024-56582], [CVE-2024-56583], [CVE-2024-56584], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56588], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56592], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56599], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56604], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56607], [CVE-2024-56608], [CVE-2024-56609], [CVE-2024-56610], [CVE-2024-56611], [CVE-2024-56613], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56620], [CVE-2024-56621], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56632], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56635], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56638], [CVE-2024-56640], [CVE-2024-56641], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56647], [CVE-2024-56648], [CVE-2024-56649], [CVE-2024-56650], [CVE-2024-56651], [CVE-2024-56658], [CVE-2024-56663], [CVE-2024-56672], [CVE-2024-56677], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56683], [CVE-2024-56685], [CVE-2024-56687], [CVE-2024-56688], [CVE-2024-56689], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56692], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56703], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56707], [CVE-2024-56708], [CVE-2024-56720], [CVE-2024-56721], [CVE-2024-56722], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56725], [CVE-2024-56726], [CVE-2024-56727], [CVE-2024-56728], [CVE-2024-56729], [CVE-2024-56739], [CVE-2024-56742], [CVE-2024-56744], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56751], [CVE-2024-56752], [CVE-2024-56754], [CVE-2024-56755], [CVE-2024-56756], [CVE-2024-56765], [CVE-2024-56771], [CVE-2024-56772], [CVE-2024-56773], [CVE-2024-56774], [CVE-2024-56775], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56782], [CVE-2024-56783], [CVE-2024-56785], [CVE-2024-56786], [CVE-2024-56787], [CVE-2024-57798], [CVE-2024-57838], [CVE-2024-57843], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57872], [CVE-2024-57874], [CVE-2024-57876], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21756], [CVE-2025-21831], [CVE-2025-21993] |
USN-7451-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74492000000 |
false |
patch |
[USN-7449-2], [CVE-2022-49034], [CVE-2024-41014], [CVE-2024-41932], [CVE-2024-41935], [CVE-2024-42122], [CVE-2024-43098], [CVE-2024-44955], [CVE-2024-45828], [CVE-2024-47141], [CVE-2024-47143], [CVE-2024-47794], [CVE-2024-47809], [CVE-2024-48873], [CVE-2024-48875], [CVE-2024-48876], [CVE-2024-48881], [CVE-2024-49569], [CVE-2024-49899], [CVE-2024-49906], [CVE-2024-50010], [CVE-2024-50051], [CVE-2024-50067], [CVE-2024-50103], [CVE-2024-50104], [CVE-2024-50105], [CVE-2024-50107], [CVE-2024-50108], [CVE-2024-50110], [CVE-2024-50111], [CVE-2024-50112], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50118], [CVE-2024-50120], [CVE-2024-50121], [CVE-2024-50124], [CVE-2024-50125], [CVE-2024-50126], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50130], [CVE-2024-50131], [CVE-2024-50133], [CVE-2024-50135], [CVE-2024-50136], [CVE-2024-50137], [CVE-2024-50138], [CVE-2024-50139], [CVE-2024-50140], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50145], [CVE-2024-50146], [CVE-2024-50147], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50152], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50155], [CVE-2024-50156], [CVE-2024-50158], [CVE-2024-50159], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50164], [CVE-2024-50166], [CVE-2024-50167], [CVE-2024-50169], [CVE-2024-50170], [CVE-2024-50172], [CVE-2024-50203], [CVE-2024-50205], [CVE-2024-50206], [CVE-2024-50207], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50210], [CVE-2024-50211], [CVE-2024-50215], [CVE-2024-50216], [CVE-2024-50218], [CVE-2024-50220], [CVE-2024-50221], [CVE-2024-50222], [CVE-2024-50223], [CVE-2024-50224], [CVE-2024-50225], [CVE-2024-50226], [CVE-2024-50230], [CVE-2024-50231], [CVE-2024-50232], [CVE-2024-50234], [CVE-2024-50235], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50238], [CVE-2024-50239], [CVE-2024-50240], [CVE-2024-50242], [CVE-2024-50243], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50246], [CVE-2024-50247], [CVE-2024-50248], [CVE-2024-50249], [CVE-2024-50250], [CVE-2024-50251], [CVE-2024-50252], [CVE-2024-50255], [CVE-2024-50256], [CVE-2024-50257], [CVE-2024-50258], [CVE-2024-50259], [CVE-2024-50261], [CVE-2024-50262], [CVE-2024-50263], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50270], [CVE-2024-50271], [CVE-2024-50272], [CVE-2024-50273], [CVE-2024-50274], [CVE-2024-50275], [CVE-2024-50276], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50280], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50284], [CVE-2024-50285], [CVE-2024-50286], [CVE-2024-50287], [CVE-2024-50288], [CVE-2024-50289], [CVE-2024-50290], [CVE-2024-50291], [CVE-2024-50292], [CVE-2024-50294], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50297], [CVE-2024-50298], [CVE-2024-50299], [CVE-2024-50300], [CVE-2024-50301], [CVE-2024-50303], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53043], [CVE-2024-53044], [CVE-2024-53045], [CVE-2024-53046], [CVE-2024-53047], [CVE-2024-53048], [CVE-2024-53050], [CVE-2024-53051], [CVE-2024-53052], [CVE-2024-53053], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53060], [CVE-2024-53061], [CVE-2024-53062], [CVE-2024-53066], [CVE-2024-53067], [CVE-2024-53068], [CVE-2024-53072], [CVE-2024-53076], [CVE-2024-53079], [CVE-2024-53081], [CVE-2024-53082], [CVE-2024-53083], [CVE-2024-53084], [CVE-2024-53085], [CVE-2024-53086], [CVE-2024-53087], [CVE-2024-53088], [CVE-2024-53089], [CVE-2024-53090], [CVE-2024-53091], [CVE-2024-53093], [CVE-2024-53094], [CVE-2024-53095], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53100], [CVE-2024-53101], [CVE-2024-53105], [CVE-2024-53106], [CVE-2024-53107], [CVE-2024-53108], [CVE-2024-53109], [CVE-2024-53110], [CVE-2024-53111], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53114], [CVE-2024-53115], [CVE-2024-53117], [CVE-2024-53118], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53123], [CVE-2024-53126], [CVE-2024-53127], [CVE-2024-53128], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53133], [CVE-2024-53134], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53139], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53147], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53154], [CVE-2024-53155], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53160], [CVE-2024-53161], [CVE-2024-53162], [CVE-2024-53163], [CVE-2024-53166], [CVE-2024-53168], [CVE-2024-53169], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53175], [CVE-2024-53176], [CVE-2024-53177], [CVE-2024-53178], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53185], [CVE-2024-53187], [CVE-2024-53188], [CVE-2024-53190], [CVE-2024-53191], [CVE-2024-53194], [CVE-2024-53195], [CVE-2024-53196], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53200], [CVE-2024-53201], [CVE-2024-53202], [CVE-2024-53203], [CVE-2024-53208], [CVE-2024-53209], [CVE-2024-53210], [CVE-2024-53213], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53218], [CVE-2024-53219], [CVE-2024-53220], [CVE-2024-53221], [CVE-2024-53222], [CVE-2024-53223], [CVE-2024-53224], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53228], [CVE-2024-53229], [CVE-2024-53230], [CVE-2024-53231], [CVE-2024-53232], [CVE-2024-53233], [CVE-2024-53234], [CVE-2024-53236], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56538], [CVE-2024-56539], [CVE-2024-56540], [CVE-2024-56543], [CVE-2024-56545], [CVE-2024-56546], [CVE-2024-56548], [CVE-2024-56549], [CVE-2024-56550], [CVE-2024-56551], [CVE-2024-56557], [CVE-2024-56558], [CVE-2024-56561], [CVE-2024-56562], [CVE-2024-56565], [CVE-2024-56566], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56573], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56577], [CVE-2024-56578], [CVE-2024-56579], [CVE-2024-56580], [CVE-2024-56581], [CVE-2024-56583], [CVE-2024-56584], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56588], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56592], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56599], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56604], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56607], [CVE-2024-56608], [CVE-2024-56609], [CVE-2024-56610], [CVE-2024-56611], [CVE-2024-56613], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56620], [CVE-2024-56621], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56632], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56635], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56638], [CVE-2024-56640], [CVE-2024-56641], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56647], [CVE-2024-56648], [CVE-2024-56649], [CVE-2024-56650], [CVE-2024-56651], [CVE-2024-56677], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56683], [CVE-2024-56685], [CVE-2024-56687], [CVE-2024-56688], [CVE-2024-56689], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56692], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56703], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56707], [CVE-2024-56708], [CVE-2024-56720], [CVE-2024-56721], [CVE-2024-56722], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56725], [CVE-2024-56726], [CVE-2024-56727], [CVE-2024-56728], [CVE-2024-56729], [CVE-2024-56739], [CVE-2024-56742], [CVE-2024-56744], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56751], [CVE-2024-56752], [CVE-2024-56754], [CVE-2024-56755], [CVE-2024-56756], [CVE-2024-56765], [CVE-2024-56771], [CVE-2024-56772], [CVE-2024-56773], [CVE-2024-56774], [CVE-2024-56775], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56782], [CVE-2024-56783], [CVE-2024-56785], [CVE-2024-56786], [CVE-2024-56787], [CVE-2024-57838], [CVE-2024-57843], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57872], [CVE-2024-57874], [CVE-2024-57876], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21756], [CVE-2025-21831], [CVE-2025-21993] |
USN-7449-2 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:74491000000 |
false |
patch |
[USN-7449-1], [CVE-2022-49034], [CVE-2024-41014], [CVE-2024-41932], [CVE-2024-41935], [CVE-2024-42122], [CVE-2024-43098], [CVE-2024-44955], [CVE-2024-45828], [CVE-2024-47141], [CVE-2024-47143], [CVE-2024-47794], [CVE-2024-47809], [CVE-2024-48873], [CVE-2024-48875], [CVE-2024-48876], [CVE-2024-48881], [CVE-2024-49569], [CVE-2024-49899], [CVE-2024-49906], [CVE-2024-50010], [CVE-2024-50051], [CVE-2024-50067], [CVE-2024-50103], [CVE-2024-50104], [CVE-2024-50105], [CVE-2024-50107], [CVE-2024-50108], [CVE-2024-50110], [CVE-2024-50111], [CVE-2024-50112], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50118], [CVE-2024-50120], [CVE-2024-50121], [CVE-2024-50124], [CVE-2024-50125], [CVE-2024-50126], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50130], [CVE-2024-50131], [CVE-2024-50133], [CVE-2024-50135], [CVE-2024-50136], [CVE-2024-50137], [CVE-2024-50138], [CVE-2024-50139], [CVE-2024-50140], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50145], [CVE-2024-50146], [CVE-2024-50147], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50152], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50155], [CVE-2024-50156], [CVE-2024-50158], [CVE-2024-50159], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50164], [CVE-2024-50166], [CVE-2024-50167], [CVE-2024-50169], [CVE-2024-50170], [CVE-2024-50172], [CVE-2024-50203], [CVE-2024-50205], [CVE-2024-50206], [CVE-2024-50207], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50210], [CVE-2024-50211], [CVE-2024-50215], [CVE-2024-50216], [CVE-2024-50218], [CVE-2024-50220], [CVE-2024-50221], [CVE-2024-50222], [CVE-2024-50223], [CVE-2024-50224], [CVE-2024-50225], [CVE-2024-50226], [CVE-2024-50230], [CVE-2024-50231], [CVE-2024-50232], [CVE-2024-50234], [CVE-2024-50235], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50238], [CVE-2024-50239], [CVE-2024-50240], [CVE-2024-50242], [CVE-2024-50243], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50246], [CVE-2024-50247], [CVE-2024-50248], [CVE-2024-50249], [CVE-2024-50250], [CVE-2024-50251], [CVE-2024-50252], [CVE-2024-50255], [CVE-2024-50256], [CVE-2024-50257], [CVE-2024-50258], [CVE-2024-50259], [CVE-2024-50261], [CVE-2024-50262], [CVE-2024-50263], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50270], [CVE-2024-50271], [CVE-2024-50272], [CVE-2024-50273], [CVE-2024-50274], [CVE-2024-50275], [CVE-2024-50276], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50280], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50284], [CVE-2024-50285], [CVE-2024-50286], [CVE-2024-50287], [CVE-2024-50288], [CVE-2024-50289], [CVE-2024-50290], [CVE-2024-50291], [CVE-2024-50292], [CVE-2024-50294], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50297], [CVE-2024-50298], [CVE-2024-50299], [CVE-2024-50300], [CVE-2024-50301], [CVE-2024-50303], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53043], [CVE-2024-53044], [CVE-2024-53045], [CVE-2024-53046], [CVE-2024-53047], [CVE-2024-53048], [CVE-2024-53050], [CVE-2024-53051], [CVE-2024-53052], [CVE-2024-53053], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53060], [CVE-2024-53061], [CVE-2024-53062], [CVE-2024-53066], [CVE-2024-53067], [CVE-2024-53068], [CVE-2024-53072], [CVE-2024-53076], [CVE-2024-53079], [CVE-2024-53081], [CVE-2024-53082], [CVE-2024-53083], [CVE-2024-53084], [CVE-2024-53085], [CVE-2024-53086], [CVE-2024-53087], [CVE-2024-53088], [CVE-2024-53089], [CVE-2024-53090], [CVE-2024-53091], [CVE-2024-53093], [CVE-2024-53094], [CVE-2024-53095], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53100], [CVE-2024-53101], [CVE-2024-53105], [CVE-2024-53106], [CVE-2024-53107], [CVE-2024-53108], [CVE-2024-53109], [CVE-2024-53110], [CVE-2024-53111], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53114], [CVE-2024-53115], [CVE-2024-53117], [CVE-2024-53118], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53123], [CVE-2024-53126], [CVE-2024-53127], [CVE-2024-53128], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53133], [CVE-2024-53134], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53139], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53147], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53154], [CVE-2024-53155], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53160], [CVE-2024-53161], [CVE-2024-53162], [CVE-2024-53163], [CVE-2024-53166], [CVE-2024-53168], [CVE-2024-53169], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53175], [CVE-2024-53176], [CVE-2024-53177], [CVE-2024-53178], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53185], [CVE-2024-53187], [CVE-2024-53188], [CVE-2024-53190], [CVE-2024-53191], [CVE-2024-53194], [CVE-2024-53195], [CVE-2024-53196], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53200], [CVE-2024-53201], [CVE-2024-53202], [CVE-2024-53203], [CVE-2024-53208], [CVE-2024-53209], [CVE-2024-53210], [CVE-2024-53213], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53218], [CVE-2024-53219], [CVE-2024-53220], [CVE-2024-53221], [CVE-2024-53222], [CVE-2024-53223], [CVE-2024-53224], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53228], [CVE-2024-53229], [CVE-2024-53230], [CVE-2024-53231], [CVE-2024-53232], [CVE-2024-53233], [CVE-2024-53234], [CVE-2024-53236], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56538], [CVE-2024-56539], [CVE-2024-56540], [CVE-2024-56543], [CVE-2024-56545], [CVE-2024-56546], [CVE-2024-56548], [CVE-2024-56549], [CVE-2024-56550], [CVE-2024-56551], [CVE-2024-56557], [CVE-2024-56558], [CVE-2024-56561], [CVE-2024-56562], [CVE-2024-56565], [CVE-2024-56566], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56573], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56577], [CVE-2024-56578], [CVE-2024-56579], [CVE-2024-56580], [CVE-2024-56581], [CVE-2024-56583], [CVE-2024-56584], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56588], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56592], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56599], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56604], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56607], [CVE-2024-56608], [CVE-2024-56609], [CVE-2024-56610], [CVE-2024-56611], [CVE-2024-56613], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56620], [CVE-2024-56621], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56632], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56635], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56638], [CVE-2024-56640], [CVE-2024-56641], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56647], [CVE-2024-56648], [CVE-2024-56649], [CVE-2024-56650], [CVE-2024-56651], [CVE-2024-56677], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56683], [CVE-2024-56685], [CVE-2024-56687], [CVE-2024-56688], [CVE-2024-56689], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56692], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56703], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56707], [CVE-2024-56708], [CVE-2024-56720], [CVE-2024-56721], [CVE-2024-56722], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56725], [CVE-2024-56726], [CVE-2024-56727], [CVE-2024-56728], [CVE-2024-56729], [CVE-2024-56739], [CVE-2024-56742], [CVE-2024-56744], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56751], [CVE-2024-56752], [CVE-2024-56754], [CVE-2024-56755], [CVE-2024-56756], [CVE-2024-56765], [CVE-2024-56771], [CVE-2024-56772], [CVE-2024-56773], [CVE-2024-56774], [CVE-2024-56775], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56782], [CVE-2024-56783], [CVE-2024-56785], [CVE-2024-56786], [CVE-2024-56787], [CVE-2024-57838], [CVE-2024-57843], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57872], [CVE-2024-57874], [CVE-2024-57876], [CVE-2025-21700], [CVE-2025-21701], [CVE-2025-21702], [CVE-2025-21756], [CVE-2025-21831], [CVE-2025-21993] |
USN-7449-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74471000000 |
false |
patch |
[USN-7447-1], [CVE-2025-3155] |
USN-7447-1 -- Yelp vulnerability |
| oval:com.ubuntu.jammy:def:74461000000 |
false |
patch |
[USN-7446-1], [CVE-2025-31492] |
USN-7446-1 -- mod_auth_openidc vulnerability |
| oval:com.ubuntu.jammy:def:74441000000 |
false |
patch |
[USN-7444-1], [CVE-2023-32683], [CVE-2023-43796], [CVE-2022-39374], [CVE-2023-41335], [CVE-2022-39335], [CVE-2023-42453], [CVE-2024-31208], [CVE-2024-53863] |
USN-7444-1 -- Synapse vulnerabilities |
| oval:com.ubuntu.jammy:def:74431000000 |
false |
patch |
[USN-7443-1], [CVE-2025-32433] |
USN-7443-1 -- Erlang vulnerability |
| oval:com.ubuntu.jammy:def:74411000000 |
false |
patch |
[USN-7441-1], [CVE-2024-10525], [CVE-2024-3935] |
USN-7441-1 -- Eclipse Mosquitto vulnerabilities |
| oval:com.ubuntu.jammy:def:74381000000 |
false |
patch |
[USN-7438-1], [CVE-2023-52168], [CVE-2023-52169] |
USN-7438-1 -- 7-Zip vulnerabilities |
| oval:com.ubuntu.jammy:def:74371000000 |
false |
patch |
[USN-7437-1], [CVE-2022-1325], [CVE-2024-26540] |
USN-7437-1 -- CImg library vulnerabilities |
| oval:com.ubuntu.jammy:def:74361000000 |
false |
patch |
[USN-7436-1], [CVE-2024-54551], [CVE-2025-24208], [CVE-2025-24209], [CVE-2025-24213], [CVE-2025-24216], [CVE-2025-24264], [CVE-2025-30427] |
USN-7436-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:74351000000 |
false |
patch |
[USN-7435-1], [CVE-2024-7254] |
USN-7435-1 -- Protocol Buffers vulnerability |
| oval:com.ubuntu.jammy:def:74341000000 |
false |
patch |
[USN-7434-1], [CVE-2024-56406] |
USN-7434-1 -- Perl vulnerability |
| oval:com.ubuntu.jammy:def:74331000000 |
false |
patch |
[USN-7433-1], [CVE-2025-27795], [CVE-2025-27796] |
USN-7433-1 -- GraphicsMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:74321000000 |
false |
patch |
[USN-7432-1], [CVE-2025-2784], [CVE-2025-32050], [CVE-2025-32051], [CVE-2025-32052], [CVE-2025-32053] |
USN-7432-1 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:74311000000 |
false |
patch |
[USN-7431-1], [CVE-2025-32464] |
USN-7431-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:74301000000 |
false |
patch |
[USN-7430-1], [CVE-2023-28686] |
USN-7430-1 -- Dino vulnerability |
| oval:com.ubuntu.jammy:def:74271000000 |
false |
patch |
[USN-7427-1], [CVE-2025-26682] |
USN-7427-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:74261000000 |
false |
patch |
[USN-7426-1], [CVE-2025-32364], [CVE-2025-32365] |
USN-7426-1 -- poppler vulnerabilities |
| oval:com.ubuntu.jammy:def:74251000000 |
false |
patch |
[USN-7425-1], [CVE-2025-30211] |
USN-7425-1 -- Erlang vulnerability |
| oval:com.ubuntu.jammy:def:74241000000 |
false |
patch |
[USN-7424-1], [CVE-2024-8176] |
USN-7424-1 -- Expat vulnerability |
| oval:com.ubuntu.jammy:def:74231000000 |
false |
patch |
[USN-7423-1], [CVE-2025-1153], [CVE-2025-1176], [CVE-2025-1178], [CVE-2025-1181], [CVE-2025-1182] |
USN-7423-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:74221000000 |
false |
patch |
[USN-7422-1], [CVE-2021-44492], [CVE-2021-44498], [CVE-2021-44500], [CVE-2021-44502], [CVE-2021-44506], [CVE-2021-44508], [CVE-2021-44509], [CVE-2021-44510] |
USN-7422-1 -- FIS-GT.M vulnerabilities |
| oval:com.ubuntu.jammy:def:74201000000 |
false |
patch |
[USN-7420-1], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-42069], [CVE-2024-56658], [CVE-2024-57798] |
USN-7420-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:74191000000 |
false |
patch |
[USN-7419-1], [CVE-2025-1215], [CVE-2025-26603] |
USN-7419-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:74181000000 |
false |
patch |
[USN-7418-1], [CVE-2024-35176], [CVE-2024-39908], [CVE-2024-41123], [CVE-2024-43398], [CVE-2025-25186], [CVE-2025-27219], [CVE-2025-27220], [CVE-2025-27221] |
USN-7418-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:74122000000 |
false |
patch |
[USN-7412-2] |
USN-7412-2 -- GnuPG regression |
| oval:com.ubuntu.jammy:def:74121000000 |
false |
patch |
[USN-7412-1], [CVE-2025-30258] |
USN-7412-1 -- GnuPG vulnerability |
| oval:com.ubuntu.jammy:def:74101000000 |
false |
patch |
[USN-7410-1], [CVE-2023-44487] |
USN-7410-1 -- Tomcat vulnerability |
| oval:com.ubuntu.jammy:def:74091000000 |
false |
patch |
[USN-7409-1], [CVE-2025-25291], [CVE-2025-25292], [CVE-2025-25293] |
USN-7409-1 -- RubySAML vulnerabilities |
| oval:com.ubuntu.jammy:def:74066000000 |
false |
patch |
[USN-7406-6], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-6 -- Linux kernel (NVIDIA Tegra IGX) vulnerabilities |
| oval:com.ubuntu.jammy:def:74065000000 |
false |
patch |
[USN-7406-5], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-5 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:74064000000 |
false |
patch |
[USN-7406-4], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-4 -- Linux kernel (Azure FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74063000000 |
false |
patch |
[USN-7406-3], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:74062000000 |
false |
patch |
[USN-7406-2], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:74061000000 |
false |
patch |
[USN-7406-1], [CVE-2024-26928], [CVE-2024-35864], [CVE-2024-56658], [CVE-2024-57798] |
USN-7406-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74041000000 |
false |
patch |
[USN-7404-1], [CVE-2021-30130], [CVE-2023-52892], [CVE-2024-27354], [CVE-2024-27355] |
USN-7404-1 -- phpseclib vulnerabilities |
| oval:com.ubuntu.jammy:def:74031000000 |
false |
patch |
[USN-7403-1], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47711], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47726], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49865], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49893], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49914], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49920], [CVE-2024-49921], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49968], [CVE-2024-49969], [CVE-2024-49972], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50009], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50019], [CVE-2024-50020], [CVE-2024-50021], [CVE-2024-50022], [CVE-2024-50023], [CVE-2024-50024], [CVE-2024-50025], [CVE-2024-50026], [CVE-2024-50027], [CVE-2024-50028], [CVE-2024-50029], [CVE-2024-50030], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50036], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50042], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50047], [CVE-2024-50048], [CVE-2024-50049], [CVE-2024-50055], [CVE-2024-50056], [CVE-2024-50057], [CVE-2024-50058], [CVE-2024-50059], [CVE-2024-50060], [CVE-2024-50061], [CVE-2024-50062], [CVE-2024-50063], [CVE-2024-50064], [CVE-2024-50065], [CVE-2024-50066], [CVE-2024-50068], [CVE-2024-50069], [CVE-2024-50070], [CVE-2024-50072], [CVE-2024-50073], [CVE-2024-50074], [CVE-2024-50075], [CVE-2024-50076], [CVE-2024-50077], [CVE-2024-50078], [CVE-2024-50080], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50084], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50087], [CVE-2024-50088], [CVE-2024-50090], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50098], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50117], [CVE-2024-50134], [CVE-2024-50148], [CVE-2024-50171], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50182], [CVE-2024-50183], [CVE-2024-50184], [CVE-2024-50185], [CVE-2024-50186], [CVE-2024-50187], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50197], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50200], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50229], [CVE-2024-50233], [CVE-2024-50302], [CVE-2024-53063], [CVE-2024-53104], [CVE-2024-53140], [CVE-2024-53144], [CVE-2024-53156], [CVE-2024-53165], [CVE-2024-53170], [CVE-2024-56582], [CVE-2024-56595], [CVE-2024-56598], [CVE-2024-56614], [CVE-2024-56658], [CVE-2024-56663], [CVE-2024-56672], [CVE-2024-57798], [CVE-2024-8805], [CVE-2025-0927] |
USN-7403-1 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:74025000000 |
false |
patch |
[USN-7402-5], [CVE-2024-50302], [CVE-2024-53063], [CVE-2024-53140], [CVE-2024-56595], [CVE-2024-56598], [CVE-2024-56658], [CVE-2024-56672], [CVE-2024-57798] |
USN-7402-5 -- Linux kernel (GCP) vulnerabilities |
| oval:com.ubuntu.jammy:def:74024000000 |
false |
patch |
[USN-7402-4], [CVE-2024-50302], [CVE-2024-53063], [CVE-2024-53140], [CVE-2024-56595], [CVE-2024-56598], [CVE-2024-56658], [CVE-2024-56672], [CVE-2024-57798] |
USN-7402-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74023000000 |
false |
patch |
[USN-7402-3], [CVE-2024-50302], [CVE-2024-53063], [CVE-2024-53140], [CVE-2024-56595], [CVE-2024-56598], [CVE-2024-56658], [CVE-2024-56672], [CVE-2024-57798] |
USN-7402-3 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:74021000000 |
false |
patch |
[USN-7402-1], [CVE-2024-50302], [CVE-2024-53063], [CVE-2024-53140], [CVE-2024-56595], [CVE-2024-56598], [CVE-2024-56658], [CVE-2024-56672], [CVE-2024-57798] |
USN-7402-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:74001000000 |
false |
patch |
[USN-7400-1], [CVE-2024-11235], [CVE-2025-1217], [CVE-2025-1219], [CVE-2025-1734], [CVE-2025-1736], [CVE-2025-1861] |
USN-7400-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:73991000000 |
false |
patch |
[USN-7399-1], [CVE-2025-30219] |
USN-7399-1 -- RabbitMQ Server vulnerability |
| oval:com.ubuntu.jammy:def:73981000000 |
false |
patch |
[USN-7398-1], [CVE-2021-33643], [CVE-2021-33644], [CVE-2021-33645], [CVE-2021-33646] |
USN-7398-1 -- libtar vulnerabilities |
| oval:com.ubuntu.jammy:def:73971000000 |
false |
patch |
[USN-7397-1], [CVE-2024-5171] |
USN-7397-1 -- AOM vulnerability |
| oval:com.ubuntu.jammy:def:73961000000 |
false |
patch |
[USN-7396-1], [CVE-2025-0650] |
USN-7396-1 -- OVN vulnerability |
| oval:com.ubuntu.jammy:def:73951000000 |
false |
patch |
[USN-7395-1], [CVE-2024-44192], [CVE-2024-54467], [CVE-2025-24201] |
USN-7395-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:73901000000 |
false |
patch |
[USN-7390-1], [CVE-2022-49034], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50121], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50242], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50275], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53096], [CVE-2024-53097], [CVE-2024-53099], [CVE-2024-53101], [CVE-2024-53103], [CVE-2024-53104], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53141], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53164], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56672], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-0927], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7390-1 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:73891000000 |
false |
patch |
[USN-7389-1], [CVE-2022-49034], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50121], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50242], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50275], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53096], [CVE-2024-53097], [CVE-2024-53099], [CVE-2024-53101], [CVE-2024-53103], [CVE-2024-53104], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53141], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53164], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56672], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-0927], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7389-1 -- Linux kernel (NVIDIA Tegra) vulnerabilities |
| oval:com.ubuntu.jammy:def:73881000000 |
false |
patch |
[USN-7388-1], [CVE-2022-49034], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50121], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50242], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50275], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50283], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53096], [CVE-2024-53097], [CVE-2024-53099], [CVE-2024-53101], [CVE-2024-53104], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53136], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53206], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56672], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-0927], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7388-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73873000000 |
false |
patch |
[USN-7387-3], [CVE-2022-49034], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50121], [CVE-2024-50242], [CVE-2024-50275], [CVE-2024-50283], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53136], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53206], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7387-3 -- Linux kernel (Real-time) vulnerabilities |
| oval:com.ubuntu.jammy:def:73872000000 |
false |
patch |
[USN-7387-2], [CVE-2022-49034], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50121], [CVE-2024-50242], [CVE-2024-50275], [CVE-2024-50283], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53136], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53206], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7387-2 -- Linux kernel (FIPS) vulnerabilities |
| oval:com.ubuntu.jammy:def:73871000000 |
false |
patch |
[USN-7387-1], [CVE-2022-49034], [CVE-2024-36476], [CVE-2024-36899], [CVE-2024-42315], [CVE-2024-43098], [CVE-2024-43900], [CVE-2024-44938], [CVE-2024-45828], [CVE-2024-46784], [CVE-2024-46809], [CVE-2024-46841], [CVE-2024-46871], [CVE-2024-47143], [CVE-2024-47408], [CVE-2024-47707], [CVE-2024-47730], [CVE-2024-48881], [CVE-2024-49571], [CVE-2024-49925], [CVE-2024-49950], [CVE-2024-49974], [CVE-2024-49996], [CVE-2024-49998], [CVE-2024-50051], [CVE-2024-50055], [CVE-2024-50121], [CVE-2024-50242], [CVE-2024-50275], [CVE-2024-50283], [CVE-2024-50304], [CVE-2024-52332], [CVE-2024-53096], [CVE-2024-53099], [CVE-2024-53112], [CVE-2024-53113], [CVE-2024-53119], [CVE-2024-53120], [CVE-2024-53121], [CVE-2024-53122], [CVE-2024-53124], [CVE-2024-53125], [CVE-2024-53127], [CVE-2024-53129], [CVE-2024-53130], [CVE-2024-53131], [CVE-2024-53135], [CVE-2024-53136], [CVE-2024-53138], [CVE-2024-53140], [CVE-2024-53142], [CVE-2024-53145], [CVE-2024-53146], [CVE-2024-53148], [CVE-2024-53150], [CVE-2024-53151], [CVE-2024-53155], [CVE-2024-53156], [CVE-2024-53157], [CVE-2024-53158], [CVE-2024-53161], [CVE-2024-53165], [CVE-2024-53171], [CVE-2024-53172], [CVE-2024-53173], [CVE-2024-53174], [CVE-2024-53180], [CVE-2024-53181], [CVE-2024-53183], [CVE-2024-53184], [CVE-2024-53194], [CVE-2024-53197], [CVE-2024-53198], [CVE-2024-53206], [CVE-2024-53214], [CVE-2024-53215], [CVE-2024-53217], [CVE-2024-53226], [CVE-2024-53227], [CVE-2024-53237], [CVE-2024-53239], [CVE-2024-53680], [CVE-2024-53685], [CVE-2024-53690], [CVE-2024-55881], [CVE-2024-55916], [CVE-2024-56369], [CVE-2024-56531], [CVE-2024-56532], [CVE-2024-56533], [CVE-2024-56539], [CVE-2024-56548], [CVE-2024-56558], [CVE-2024-56562], [CVE-2024-56567], [CVE-2024-56568], [CVE-2024-56569], [CVE-2024-56570], [CVE-2024-56572], [CVE-2024-56574], [CVE-2024-56575], [CVE-2024-56576], [CVE-2024-56578], [CVE-2024-56581], [CVE-2024-56586], [CVE-2024-56587], [CVE-2024-56589], [CVE-2024-56590], [CVE-2024-56593], [CVE-2024-56594], [CVE-2024-56595], [CVE-2024-56596], [CVE-2024-56597], [CVE-2024-56598], [CVE-2024-56600], [CVE-2024-56601], [CVE-2024-56602], [CVE-2024-56603], [CVE-2024-56605], [CVE-2024-56606], [CVE-2024-56610], [CVE-2024-56614], [CVE-2024-56615], [CVE-2024-56616], [CVE-2024-56619], [CVE-2024-56622], [CVE-2024-56623], [CVE-2024-56625], [CVE-2024-56626], [CVE-2024-56627], [CVE-2024-56629], [CVE-2024-56630], [CVE-2024-56631], [CVE-2024-56633], [CVE-2024-56634], [CVE-2024-56636], [CVE-2024-56637], [CVE-2024-56640], [CVE-2024-56642], [CVE-2024-56643], [CVE-2024-56644], [CVE-2024-56645], [CVE-2024-56648], [CVE-2024-56650], [CVE-2024-56659], [CVE-2024-56662], [CVE-2024-56670], [CVE-2024-56678], [CVE-2024-56679], [CVE-2024-56681], [CVE-2024-56688], [CVE-2024-56690], [CVE-2024-56691], [CVE-2024-56693], [CVE-2024-56694], [CVE-2024-56698], [CVE-2024-56700], [CVE-2024-56701], [CVE-2024-56704], [CVE-2024-56705], [CVE-2024-56708], [CVE-2024-56715], [CVE-2024-56716], [CVE-2024-56720], [CVE-2024-56723], [CVE-2024-56724], [CVE-2024-56726], [CVE-2024-56728], [CVE-2024-56739], [CVE-2024-56745], [CVE-2024-56746], [CVE-2024-56747], [CVE-2024-56748], [CVE-2024-56754], [CVE-2024-56756], [CVE-2024-56759], [CVE-2024-56763], [CVE-2024-56767], [CVE-2024-56769], [CVE-2024-56770], [CVE-2024-56774], [CVE-2024-56776], [CVE-2024-56777], [CVE-2024-56778], [CVE-2024-56779], [CVE-2024-56780], [CVE-2024-56781], [CVE-2024-56785], [CVE-2024-56787], [CVE-2024-57791], [CVE-2024-57792], [CVE-2024-57802], [CVE-2024-57807], [CVE-2024-57838], [CVE-2024-57841], [CVE-2024-57849], [CVE-2024-57850], [CVE-2024-57874], [CVE-2024-57882], [CVE-2024-57884], [CVE-2024-57889], [CVE-2024-57890], [CVE-2024-57892], [CVE-2024-57896], [CVE-2024-57897], [CVE-2024-57900], [CVE-2024-57901], [CVE-2024-57902], [CVE-2024-57903], [CVE-2024-57904], [CVE-2024-57906], [CVE-2024-57907], [CVE-2024-57908], [CVE-2024-57910], [CVE-2024-57911], [CVE-2024-57912], [CVE-2024-57913], [CVE-2024-57917], [CVE-2024-57922], [CVE-2024-57925], [CVE-2024-57929], [CVE-2024-57931], [CVE-2024-57938], [CVE-2024-57939], [CVE-2024-57940], [CVE-2024-57946], [CVE-2024-57948], [CVE-2024-57951], [CVE-2024-58087], [CVE-2025-21631], [CVE-2025-21636], [CVE-2025-21637], [CVE-2025-21638], [CVE-2025-21639], [CVE-2025-21640], [CVE-2025-21646], [CVE-2025-21648], [CVE-2025-21653], [CVE-2025-21664], [CVE-2025-21665], [CVE-2025-21666], [CVE-2025-21669], [CVE-2025-21678], [CVE-2025-21680], [CVE-2025-21683], [CVE-2025-21687], [CVE-2025-21689], [CVE-2025-21690], [CVE-2025-21692], [CVE-2025-21694], [CVE-2025-21697], [CVE-2025-21699] |
USN-7387-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73842000000 |
false |
patch |
[USN-7384-2], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47711], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47726], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49865], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49893], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49914], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49920], [CVE-2024-49921], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49968], [CVE-2024-49969], [CVE-2024-49972], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50009], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50019], [CVE-2024-50020], [CVE-2024-50021], [CVE-2024-50022], [CVE-2024-50023], [CVE-2024-50024], [CVE-2024-50025], [CVE-2024-50026], [CVE-2024-50027], [CVE-2024-50028], [CVE-2024-50029], [CVE-2024-50030], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50036], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50042], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50047], [CVE-2024-50048], [CVE-2024-50049], [CVE-2024-50055], [CVE-2024-50056], [CVE-2024-50057], [CVE-2024-50058], [CVE-2024-50059], [CVE-2024-50060], [CVE-2024-50061], [CVE-2024-50062], [CVE-2024-50063], [CVE-2024-50064], [CVE-2024-50065], [CVE-2024-50066], [CVE-2024-50068], [CVE-2024-50069], [CVE-2024-50070], [CVE-2024-50072], [CVE-2024-50073], [CVE-2024-50074], [CVE-2024-50075], [CVE-2024-50076], [CVE-2024-50077], [CVE-2024-50078], [CVE-2024-50080], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50084], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50087], [CVE-2024-50088], [CVE-2024-50090], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50098], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50117], [CVE-2024-50134], [CVE-2024-50148], [CVE-2024-50171], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50182], [CVE-2024-50183], [CVE-2024-50184], [CVE-2024-50185], [CVE-2024-50186], [CVE-2024-50187], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50197], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50200], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50229], [CVE-2024-50233], [CVE-2024-53104], [CVE-2024-53144], [CVE-2024-53156], [CVE-2024-53165], [CVE-2024-53170], [CVE-2024-56582], [CVE-2024-56614], [CVE-2024-56663], [CVE-2024-8805], [CVE-2025-0927], [CVE-2025-2312] |
USN-7384-2 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:73831000000 |
false |
patch |
[USN-7383-1], [CVE-2024-47711], [CVE-2024-47726], [CVE-2024-49865], [CVE-2024-49893], [CVE-2024-49914], [CVE-2024-49920], [CVE-2024-49921], [CVE-2024-49968], [CVE-2024-49972], [CVE-2024-50009], [CVE-2024-50019], [CVE-2024-50020], [CVE-2024-50021], [CVE-2024-50022], [CVE-2024-50023], [CVE-2024-50024], [CVE-2024-50025], [CVE-2024-50026], [CVE-2024-50027], [CVE-2024-50028], [CVE-2024-50029], [CVE-2024-50030], [CVE-2024-50031], [CVE-2024-50032], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50036], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50042], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50047], [CVE-2024-50048], [CVE-2024-50049], [CVE-2024-50055], [CVE-2024-50056], [CVE-2024-50057], [CVE-2024-50058], [CVE-2024-50059], [CVE-2024-50060], [CVE-2024-50061], [CVE-2024-50062], [CVE-2024-50063], [CVE-2024-50064], [CVE-2024-50065], [CVE-2024-50066], [CVE-2024-50068], [CVE-2024-50069], [CVE-2024-50070], [CVE-2024-50072], [CVE-2024-50073], [CVE-2024-50074], [CVE-2024-50075], [CVE-2024-50076], [CVE-2024-50077], [CVE-2024-50078], [CVE-2024-50080], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50084], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50087], [CVE-2024-50088], [CVE-2024-50090], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50098], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50117], [CVE-2024-50134], [CVE-2024-50148], [CVE-2024-50171], [CVE-2024-50180], [CVE-2024-50182], [CVE-2024-50183], [CVE-2024-50184], [CVE-2024-50185], [CVE-2024-50186], [CVE-2024-50187], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50197], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50200], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50229], [CVE-2024-50233], [CVE-2024-53156], [CVE-2024-53165], [CVE-2024-53170], [CVE-2024-56582], [CVE-2024-56614], [CVE-2024-56663] |
USN-7383-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73781000000 |
false |
patch |
[USN-7378-1], [CVE-2025-27830], [CVE-2025-27831], [CVE-2025-27832], [CVE-2025-27833], [CVE-2025-27834], [CVE-2025-27835], [CVE-2025-27836] |
USN-7378-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:73762000000 |
false |
patch |
[USN-7376-2], [CVE-2025-21490] |
USN-7376-2 -- MariaDB vulnerability |
| oval:com.ubuntu.jammy:def:73751000000 |
false |
patch |
[USN-7375-1], [CVE-2023-28617], [CVE-2024-30202], [CVE-2024-30205], [CVE-2024-39331] |
USN-7375-1 -- Org Mode vulnerabilities |
| oval:com.ubuntu.jammy:def:73741000000 |
false |
patch |
[USN-7374-1], [CVE-2024-40635] |
USN-7374-1 -- containerd vulnerability |
| oval:com.ubuntu.jammy:def:73721000000 |
false |
patch |
[USN-7372-1], [CVE-2022-45060] |
USN-7372-1 -- Varnish vulnerability |
| oval:com.ubuntu.jammy:def:73701000000 |
false |
patch |
[USN-7370-1], [CVE-2024-24198], [CVE-2024-24199], [CVE-2024-42643] |
USN-7370-1 -- SmartDNS vulnerabilities |
| oval:com.ubuntu.jammy:def:73691000000 |
false |
patch |
[USN-7369-1], [CVE-2024-25260], [CVE-2025-1365], [CVE-2025-1371], [CVE-2025-1372], [CVE-2025-1377] |
USN-7369-1 -- elfutils vulnerabilities |
| oval:com.ubuntu.jammy:def:73661000000 |
false |
patch |
[USN-7366-1], [CVE-2025-25184], [CVE-2025-27111], [CVE-2025-27610] |
USN-7366-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:73641000000 |
false |
patch |
[USN-7364-1] |
USN-7364-1 -- OpenSAML vulnerability |
| oval:com.ubuntu.jammy:def:73631000000 |
false |
patch |
[USN-7363-1], [CVE-2025-24032], [CVE-2025-24531] |
USN-7363-1 -- PAM-PKCS#11 vulnerabilities |
| oval:com.ubuntu.jammy:def:73611000000 |
false |
patch |
[USN-7361-1], [CVE-2025-24855] |
USN-7361-1 -- Libxslt vulnerability |
| oval:com.ubuntu.jammy:def:73571000000 |
false |
patch |
[USN-7357-1], [CVE-2024-55549] |
USN-7357-1 -- Libxslt vulnerability |
| oval:com.ubuntu.jammy:def:73561000000 |
false |
patch |
[USN-7356-1], [CVE-2024-34402], [CVE-2024-34403] |
USN-7356-1 -- uriparser vulnerabilities |
| oval:com.ubuntu.jammy:def:73551000000 |
false |
patch |
[USN-7355-1], [CVE-2023-37271], [CVE-2023-41039], [CVE-2024-47532], [CVE-2025-22153] |
USN-7355-1 -- RestrictedPython vulnerabilities |
| oval:com.ubuntu.jammy:def:73541000000 |
false |
patch |
[USN-7354-1], [CVE-2024-21543] |
USN-7354-1 -- djoser vulnerability |
| oval:com.ubuntu.jammy:def:73531000000 |
false |
patch |
[USN-7353-1], [CVE-2022-1231] |
USN-7353-1 -- PlantUML vulnerability |
| oval:com.ubuntu.jammy:def:73521000000 |
false |
patch |
[USN-7352-1], [CVE-2025-27363] |
USN-7352-1 -- FreeType vulnerability |
| oval:com.ubuntu.jammy:def:73511000000 |
false |
patch |
[USN-7351-1], [CVE-2020-10688], [CVE-2020-1695], [CVE-2020-25633], [CVE-2021-20289], [CVE-2023-0482], [CVE-2024-9622] |
USN-7351-1 -- RESTEasy vulnerabilities |
| oval:com.ubuntu.jammy:def:73501000000 |
false |
patch |
[USN-7350-1], [CVE-2022-30333], [CVE-2022-48579], [CVE-2023-40477], [CVE-2024-33899] |
USN-7350-1 -- UnRAR vulnerabilities |
| oval:com.ubuntu.jammy:def:73491000000 |
false |
patch |
[USN-7349-1], [CVE-2022-30333], [CVE-2023-40477] |
USN-7349-1 -- RAR vulnerabilities |
| oval:com.ubuntu.jammy:def:73471000000 |
false |
patch |
[USN-7347-1], [CVE-2024-38439], [CVE-2024-38440], [CVE-2024-38441] |
USN-7347-1 -- Netatalk vulnerabilities |
| oval:com.ubuntu.jammy:def:73461000000 |
false |
patch |
[USN-7346-1], [CVE-2021-42780], [CVE-2021-42782], [CVE-2023-2977], [CVE-2023-40660], [CVE-2023-40661], [CVE-2023-5992], [CVE-2024-45615], [CVE-2024-45616], [CVE-2024-45617], [CVE-2024-45618], [CVE-2024-45619], [CVE-2024-45620], [CVE-2024-8443] |
USN-7346-1 -- OpenSC vulnerabilities |
| oval:com.ubuntu.jammy:def:73451000000 |
false |
patch |
[USN-7345-1], [CVE-2025-24070] |
USN-7345-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:73431000000 |
false |
patch |
[USN-7343-1], [CVE-2024-56201], [CVE-2024-56326], [CVE-2025-27516] |
USN-7343-1 -- Jinja2 vulnerabilities |
| oval:com.ubuntu.jammy:def:73371000000 |
false |
patch |
[USN-7337-1], [CVE-2025-1080] |
USN-7337-1 -- LibreOffice vulnerability |
| oval:com.ubuntu.jammy:def:73361000000 |
false |
patch |
[USN-7336-1], [CVE-2021-30184] |
USN-7336-1 -- GNU Chess vulnerability |
| oval:com.ubuntu.jammy:def:73351000000 |
false |
patch |
[USN-7335-1], [CVE-2025-26699] |
USN-7335-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:73291000000 |
false |
patch |
[USN-7329-1], [CVE-2024-50274], [CVE-2024-53064], [CVE-2024-56672], [CVE-2025-0927] |
USN-7329-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73283000000 |
false |
patch |
[USN-7328-3], [CVE-2024-56672], [CVE-2025-0927] |
USN-7328-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73282000000 |
false |
patch |
[USN-7328-2], [CVE-2024-56672], [CVE-2025-0927] |
USN-7328-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73281000000 |
false |
patch |
[USN-7328-1], [CVE-2024-56672], [CVE-2025-0927] |
USN-7328-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73271000000 |
false |
patch |
[USN-7327-1], [CVE-2024-56672] |
USN-7327-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:73261000000 |
false |
patch |
[USN-7326-1], [CVE-2024-50274], [CVE-2024-53064], [CVE-2024-53104], [CVE-2025-0927] |
USN-7326-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73253000000 |
false |
patch |
[USN-7325-3], [CVE-2024-53104], [CVE-2025-0927] |
USN-7325-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73251000000 |
false |
patch |
[USN-7325-1], [CVE-2024-53104], [CVE-2025-0927] |
USN-7325-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73241000000 |
false |
patch |
[USN-7324-1], [CVE-2024-53104] |
USN-7324-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:73211000000 |
false |
patch |
[USN-7321-1], [CVE-2024-31228], [CVE-2024-46981], [CVE-2024-51741] |
USN-7321-1 -- Redis vulnerabilities |
| oval:com.ubuntu.jammy:def:73201000000 |
false |
patch |
[USN-7320-1], [CVE-2023-5520], [CVE-2024-0321], [CVE-2024-0322] |
USN-7320-1 -- GPAC vulnerabilities |
| oval:com.ubuntu.jammy:def:73191000000 |
false |
patch |
[USN-7319-1], [CVE-2022-39209], [CVE-2023-22483], [CVE-2023-22484], [CVE-2023-22486], [CVE-2023-26485] |
USN-7319-1 -- cmark-gfm vulnerabilities |
| oval:com.ubuntu.jammy:def:73171000000 |
false |
patch |
[USN-7317-1], [CVE-2022-23303], [CVE-2022-23304], [CVE-2022-37660] |
USN-7317-1 -- wpa_supplicant and hostapd vulnerabilities |
| oval:com.ubuntu.jammy:def:73161000000 |
false |
patch |
[USN-7316-1], [CVE-2020-25713], [CVE-2024-57822], [CVE-2024-57823] |
USN-7316-1 -- Raptor vulnerabilities |
| oval:com.ubuntu.jammy:def:73151000000 |
false |
patch |
[USN-7315-1], [CVE-2025-1094] |
USN-7315-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:73141000000 |
false |
patch |
[USN-7314-1], [CVE-2024-26458], [CVE-2024-26461], [CVE-2024-26462], [CVE-2025-24528] |
USN-7314-1 -- Kerberos vulnerabilities |
| oval:com.ubuntu.jammy:def:73131000000 |
false |
patch |
[USN-7313-1], [CVE-2025-26618] |
USN-7313-1 -- Erlang vulnerability |
| oval:com.ubuntu.jammy:def:73111000000 |
false |
patch |
[USN-7311-1], [CVE-2023-52917], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-53103], [CVE-2024-53141], [CVE-2024-53144], [CVE-2024-53164] |
USN-7311-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73091000000 |
false |
patch |
[USN-7309-1], [CVE-2016-5697], [CVE-2017-11428], [CVE-2024-45409] |
USN-7309-1 -- Ruby SAML vulnerabilities |
| oval:com.ubuntu.jammy:def:73081000000 |
false |
patch |
[USN-7308-1], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53103], [CVE-2024-53104], [CVE-2024-53141], [CVE-2024-53164] |
USN-7308-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73071000000 |
false |
patch |
[USN-7307-1], [CVE-2012-1148] |
USN-7307-1 -- xmltok library vulnerability |
| oval:com.ubuntu.jammy:def:73061000000 |
false |
patch |
[USN-7306-1], [CVE-2024-57360], [CVE-2025-0840] |
USN-7306-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:73051000000 |
false |
patch |
[USN-7305-1], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104] |
USN-7305-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73033000000 |
false |
patch |
[USN-7303-3], [CVE-2023-52917], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-53144] |
USN-7303-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73032000000 |
false |
patch |
[USN-7303-2], [CVE-2023-52917], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-53144] |
USN-7303-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73031000000 |
false |
patch |
[USN-7303-1], [CVE-2023-52917], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-53144] |
USN-7303-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:73021000000 |
false |
patch |
[USN-7302-1], [CVE-2022-49043], [CVE-2024-34459], [CVE-2024-56171], [CVE-2025-24928], [CVE-2025-27113] |
USN-7302-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:73011000000 |
false |
patch |
[USN-7301-1], [CVE-2023-52917], [CVE-2024-41016], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47675], [CVE-2024-47677], [CVE-2024-47678], [CVE-2024-47679], [CVE-2024-47681], [CVE-2024-47682], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47686], [CVE-2024-47687], [CVE-2024-47688], [CVE-2024-47689], [CVE-2024-47690], [CVE-2024-47691], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47700], [CVE-2024-47701], [CVE-2024-47702], [CVE-2024-47703], [CVE-2024-47704], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47707], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47714], [CVE-2024-47715], [CVE-2024-47716], [CVE-2024-47718], [CVE-2024-47719], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47727], [CVE-2024-47728], [CVE-2024-47730], [CVE-2024-47731], [CVE-2024-47732], [CVE-2024-47733], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47738], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47741], [CVE-2024-47742], [CVE-2024-47743], [CVE-2024-47744], [CVE-2024-47745], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47750], [CVE-2024-47751], [CVE-2024-47752], [CVE-2024-47753], [CVE-2024-47754], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49850], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49853], [CVE-2024-49855], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49859], [CVE-2024-49860], [CVE-2024-49861], [CVE-2024-49862], [CVE-2024-49863], [CVE-2024-49864], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49870], [CVE-2024-49871], [CVE-2024-49874], [CVE-2024-49875], [CVE-2024-49876], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49880], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49885], [CVE-2024-49886], [CVE-2024-49888], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49891], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49897], [CVE-2024-49898], [CVE-2024-49900], [CVE-2024-49901], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49905], [CVE-2024-49907], [CVE-2024-49909], [CVE-2024-49911], [CVE-2024-49912], [CVE-2024-49913], [CVE-2024-49915], [CVE-2024-49917], [CVE-2024-49918], [CVE-2024-49919], [CVE-2024-49922], [CVE-2024-49923], [CVE-2024-49924], [CVE-2024-49925], [CVE-2024-49926], [CVE-2024-49927], [CVE-2024-49928], [CVE-2024-49929], [CVE-2024-49930], [CVE-2024-49931], [CVE-2024-49933], [CVE-2024-49934], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49937], [CVE-2024-49938], [CVE-2024-49939], [CVE-2024-49942], [CVE-2024-49944], [CVE-2024-49945], [CVE-2024-49946], [CVE-2024-49947], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49950], [CVE-2024-49951], [CVE-2024-49952], [CVE-2024-49953], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49960], [CVE-2024-49961], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49974], [CVE-2024-49975], [CVE-2024-49976], [CVE-2024-49977], [CVE-2024-49978], [CVE-2024-49980], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49986], [CVE-2024-49987], [CVE-2024-49988], [CVE-2024-49989], [CVE-2024-49991], [CVE-2024-49992], [CVE-2024-49994], [CVE-2024-49995], [CVE-2024-49996], [CVE-2024-49997], [CVE-2024-49998], [CVE-2024-49999], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50005], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50012], [CVE-2024-50013], [CVE-2024-50014], [CVE-2024-50015], [CVE-2024-50016], [CVE-2024-50017], [CVE-2024-50175], [CVE-2024-50176], [CVE-2024-50179], [CVE-2024-53144], [CVE-2025-0927] |
USN-7301-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72991000000 |
false |
patch |
[USN-7299-1], [CVE-2025-26594], [CVE-2025-26595], [CVE-2025-26596], [CVE-2025-26597], [CVE-2025-26598], [CVE-2025-26599], [CVE-2025-26600], [CVE-2025-26601] |
USN-7299-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:72971000000 |
false |
patch |
[USN-7297-1], [CVE-2023-48795], [CVE-2023-51713], [CVE-2024-48651] |
USN-7297-1 -- ProFTPD vulnerabilities |
| oval:com.ubuntu.jammy:def:72921000000 |
false |
patch |
[USN-7292-1], [CVE-2021-36369], [CVE-2023-48795] |
USN-7292-1 -- Dropbear vulnerabilities |
| oval:com.ubuntu.jammy:def:72911000000 |
false |
patch |
[USN-7291-1], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104] |
USN-7291-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72901000000 |
false |
patch |
[USN-7290-1], [CVE-2024-41128], [CVE-2024-47887], [CVE-2024-47888], [CVE-2024-47889] |
USN-7290-1 -- Rails vulnerabilities |
| oval:com.ubuntu.jammy:def:72894000000 |
false |
patch |
[USN-7289-4], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104] |
USN-7289-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72893000000 |
false |
patch |
[USN-7289-3], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104] |
USN-7289-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72891000000 |
false |
patch |
[USN-7289-1], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104] |
USN-7289-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72881000000 |
false |
patch |
[USN-7288-1], [CVE-2023-52913], [CVE-2024-26718], [CVE-2024-35887], [CVE-2024-39497], [CVE-2024-40953], [CVE-2024-40965], [CVE-2024-41066], [CVE-2024-41080], [CVE-2024-42252], [CVE-2024-42291], [CVE-2024-50010], [CVE-2024-50036], [CVE-2024-50058], [CVE-2024-50072], [CVE-2024-50074], [CVE-2024-50082], [CVE-2024-50083], [CVE-2024-50085], [CVE-2024-50086], [CVE-2024-50099], [CVE-2024-50101], [CVE-2024-50103], [CVE-2024-50110], [CVE-2024-50115], [CVE-2024-50116], [CVE-2024-50117], [CVE-2024-50127], [CVE-2024-50128], [CVE-2024-50131], [CVE-2024-50134], [CVE-2024-50141], [CVE-2024-50142], [CVE-2024-50143], [CVE-2024-50148], [CVE-2024-50150], [CVE-2024-50151], [CVE-2024-50153], [CVE-2024-50154], [CVE-2024-50156], [CVE-2024-50160], [CVE-2024-50162], [CVE-2024-50163], [CVE-2024-50167], [CVE-2024-50168], [CVE-2024-50171], [CVE-2024-50182], [CVE-2024-50185], [CVE-2024-50192], [CVE-2024-50193], [CVE-2024-50194], [CVE-2024-50195], [CVE-2024-50196], [CVE-2024-50198], [CVE-2024-50199], [CVE-2024-50201], [CVE-2024-50202], [CVE-2024-50205], [CVE-2024-50208], [CVE-2024-50209], [CVE-2024-50218], [CVE-2024-50229], [CVE-2024-50230], [CVE-2024-50232], [CVE-2024-50233], [CVE-2024-50234], [CVE-2024-50236], [CVE-2024-50237], [CVE-2024-50244], [CVE-2024-50245], [CVE-2024-50247], [CVE-2024-50249], [CVE-2024-50251], [CVE-2024-50257], [CVE-2024-50259], [CVE-2024-50262], [CVE-2024-50265], [CVE-2024-50267], [CVE-2024-50268], [CVE-2024-50269], [CVE-2024-50273], [CVE-2024-50278], [CVE-2024-50279], [CVE-2024-50282], [CVE-2024-50287], [CVE-2024-50290], [CVE-2024-50292], [CVE-2024-50295], [CVE-2024-50296], [CVE-2024-50299], [CVE-2024-50301], [CVE-2024-50302], [CVE-2024-53042], [CVE-2024-53052], [CVE-2024-53055], [CVE-2024-53058], [CVE-2024-53059], [CVE-2024-53061], [CVE-2024-53063], [CVE-2024-53066], [CVE-2024-53088], [CVE-2024-53097], [CVE-2024-53101], [CVE-2024-53104], [CVE-2025-0927] |
USN-7288-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72871000000 |
false |
patch |
[USN-7287-1], [CVE-2025-1390] |
USN-7287-1 -- libcap2 vulnerability |
| oval:com.ubuntu.jammy:def:72861000000 |
false |
patch |
[USN-7286-1], [CVE-2025-0633] |
USN-7286-1 -- iniParser vulnerability |
| oval:com.ubuntu.jammy:def:72851000000 |
false |
patch |
[USN-7285-1], [CVE-2025-23419] |
USN-7285-1 -- nginx vulnerability |
| oval:com.ubuntu.jammy:def:72841000000 |
false |
patch |
[USN-7284-1], [CVE-2022-24823], [CVE-2024-29025] |
USN-7284-1 -- Netty vulnerabilities |
| oval:com.ubuntu.jammy:def:72811000000 |
false |
patch |
[USN-7281-1], [CVE-2024-12243] |
USN-7281-1 -- GnuTLS vulnerability |
| oval:com.ubuntu.jammy:def:72802000000 |
false |
patch |
[USN-7280-2], [CVE-2025-0938] |
USN-7280-2 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:72801000000 |
false |
patch |
[USN-7280-1], [CVE-2025-0938] |
USN-7280-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:72791000000 |
false |
patch |
[USN-7279-1], [CVE-2025-24143], [CVE-2025-24150], [CVE-2025-24158], [CVE-2025-24162] |
USN-7279-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:72781000000 |
false |
patch |
[USN-7278-1], [CVE-2024-13176], [CVE-2024-9143] |
USN-7278-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:72751000000 |
false |
patch |
[USN-7275-1], [CVE-2024-12133] |
USN-7275-1 -- Libtasn1 vulnerability |
| oval:com.ubuntu.jammy:def:72741000000 |
false |
patch |
[USN-7274-1], [CVE-2019-1010006], [CVE-2019-11459], [CVE-2023-51698] |
USN-7274-1 -- Atril vulnerabilities |
| oval:com.ubuntu.jammy:def:72731000000 |
false |
patch |
[USN-7273-1], [CVE-2021-4156], [CVE-2024-50612] |
USN-7273-1 -- libsndfile vulnerabilities |
| oval:com.ubuntu.jammy:def:72721000000 |
false |
patch |
[USN-7272-1], [CVE-2022-24894], [CVE-2022-24895], [CVE-2023-46734], [CVE-2024-50340], [CVE-2024-50341], [CVE-2024-50342], [CVE-2024-50343], [CVE-2024-50345], [CVE-2024-51996] |
USN-7272-1 -- Symfony vulnerabilities |
| oval:com.ubuntu.jammy:def:72711000000 |
false |
patch |
[USN-7271-1], [CVE-2024-53899] |
USN-7271-1 -- virtualenv vulnerability |
| oval:com.ubuntu.jammy:def:72701000000 |
false |
patch |
[USN-7270-1], [CVE-2025-26465], [CVE-2025-26466] |
USN-7270-1 -- OpenSSH vulnerabilities |
| oval:com.ubuntu.jammy:def:72691000000 |
false |
patch |
[USN-7269-1], [CVE-2024-31068], [CVE-2024-36293], [CVE-2024-39279] |
USN-7269-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:72681000000 |
false |
patch |
[USN-7268-1], [CVE-2022-41678], [CVE-2023-46604] |
USN-7268-1 -- Apache ActiveMQ vulnerabilities |
| oval:com.ubuntu.jammy:def:72661000000 |
false |
patch |
[USN-7266-1], [CVE-2017-0691], [CVE-2020-19858], [CVE-2020-22628], [CVE-2020-35530], [CVE-2020-35531], [CVE-2020-35532], [CVE-2020-35533], [CVE-2021-32142], [CVE-2023-1729] |
USN-7266-1 -- digiKam vulnerabilities |
| oval:com.ubuntu.jammy:def:72611000000 |
false |
patch |
[USN-7261-1], [CVE-2025-24014] |
USN-7261-1 -- Vim vulnerability |
| oval:com.ubuntu.jammy:def:72601000000 |
false |
patch |
[USN-7260-1], [CVE-2023-37476], [CVE-2023-41886], [CVE-2023-41887], [CVE-2024-23833], [CVE-2024-47878], [CVE-2024-47879], [CVE-2024-47880], [CVE-2024-47881], [CVE-2024-47882], [CVE-2024-49760] |
USN-7260-1 -- OpenRefine vulnerabilities |
| oval:com.ubuntu.jammy:def:72591000000 |
false |
patch |
[USN-7259-1], [CVE-2025-0395] |
USN-7259-1 -- GNU C Library vulnerability |
| oval:com.ubuntu.jammy:def:72581000000 |
false |
patch |
[USN-7258-1], [CVE-2022-24728], [CVE-2023-28439], [CVE-2024-24815], [CVE-2024-24816], [CVE-2024-43411] |
USN-7258-1 -- CKEditor vulnerabilities |
| oval:com.ubuntu.jammy:def:72571000000 |
false |
patch |
[USN-7257-1], [CVE-2024-3596] |
USN-7257-1 -- Kerberos vulnerability |
| oval:com.ubuntu.jammy:def:72541000000 |
false |
patch |
[USN-7254-1], [CVE-2025-21502] |
USN-7254-1 -- OpenJDK 21 vulnerability |
| oval:com.ubuntu.jammy:def:72531000000 |
false |
patch |
[USN-7253-1], [CVE-2025-21502] |
USN-7253-1 -- OpenJDK 17 vulnerability |
| oval:com.ubuntu.jammy:def:72521000000 |
false |
patch |
[USN-7252-1], [CVE-2025-21502] |
USN-7252-1 -- OpenJDK 11 vulnerability |
| oval:com.ubuntu.jammy:def:72511000000 |
false |
patch |
[USN-7251-1], [CVE-2023-25193] |
USN-7251-1 -- HarfBuzz vulnerability |
| oval:com.ubuntu.jammy:def:72501000000 |
false |
patch |
[USN-7250-1], [CVE-2018-18836], [CVE-2018-18837], [CVE-2018-18838], [CVE-2023-22497], [CVE-2024-23722], [CVE-2024-34250], [CVE-2024-34251] |
USN-7250-1 -- Netdata vulnerabilities |
| oval:com.ubuntu.jammy:def:72471000000 |
false |
patch |
[USN-7247-1], [CVE-2019-14493], [CVE-2019-16249], [CVE-2019-19624], [CVE-2023-2617], [CVE-2023-2618] |
USN-7247-1 -- OpenCV vulnerabilities |
| oval:com.ubuntu.jammy:def:72451000000 |
false |
patch |
[USN-7245-1], [CVE-2025-21490], [CVE-2025-21491], [CVE-2025-21497], [CVE-2025-21500], [CVE-2025-21501], [CVE-2025-21503], [CVE-2025-21505], [CVE-2025-21518], [CVE-2025-21519], [CVE-2025-21522], [CVE-2025-21523], [CVE-2025-21529], [CVE-2025-21540], [CVE-2025-21546], [CVE-2025-21555], [CVE-2025-21559] |
USN-7245-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:72441000000 |
false |
patch |
[USN-7244-1], [CVE-2024-56201], [CVE-2024-56326] |
USN-7244-1 -- Jinja2 vulnerabilities |
| oval:com.ubuntu.jammy:def:72431000000 |
false |
patch |
[USN-7243-1], [CVE-2024-46461] |
USN-7243-1 -- VLC vulnerability |
| oval:com.ubuntu.jammy:def:72411000000 |
false |
patch |
[USN-7241-1], [CVE-2024-11187], [CVE-2024-12705] |
USN-7241-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:72401000000 |
false |
patch |
[USN-7240-1], [CVE-2022-49043], [CVE-2024-34459] |
USN-7240-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:72363000000 |
false |
patch |
[USN-7236-3], [CVE-2024-53103], [CVE-2024-53141], [CVE-2024-53164] |
USN-7236-3 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:72362000000 |
false |
patch |
[USN-7236-2], [CVE-2024-53103], [CVE-2024-53141], [CVE-2024-53164] |
USN-7236-2 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:72361000000 |
false |
patch |
[USN-7236-1], [CVE-2024-53103], [CVE-2024-53141], [CVE-2024-53164] |
USN-7236-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72351000000 |
false |
patch |
[USN-7235-1], [CVE-2024-53103], [CVE-2024-53141], [CVE-2024-53164] |
USN-7235-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:72311000000 |
false |
patch |
[USN-7231-1], [CVE-2023-27783], [CVE-2023-27784], [CVE-2023-27785], [CVE-2023-27786], [CVE-2023-27787], [CVE-2023-27788], [CVE-2023-27789], [CVE-2023-4256], [CVE-2023-43279] |
USN-7231-1 -- Tcpreplay vulnerabilities |
| oval:com.ubuntu.jammy:def:72302000000 |
false |
patch |
[USN-7230-2], [CVE-2024-44070], [CVE-2024-55553] |
USN-7230-2 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:72281000000 |
false |
patch |
[USN-7228-1], [CVE-2024-12425], [CVE-2024-12426] |
USN-7228-1 -- LibreOffice vulnerabilities |
| oval:com.ubuntu.jammy:def:72271000000 |
false |
patch |
[USN-7227-1], [CVE-2024-53432] |
USN-7227-1 -- PCL vulnerability |
| oval:com.ubuntu.jammy:def:72261000000 |
false |
patch |
[USN-7226-1], [CVE-2022-46169] |
USN-7226-1 -- Cacti vulnerability |
| oval:com.ubuntu.jammy:def:72251000000 |
false |
patch |
[USN-7225-1], [CVE-2022-0137], [CVE-2022-0534], [CVE-2022-24191], [CVE-2022-27114], [CVE-2022-28085], [CVE-2022-34033], [CVE-2022-34035], [CVE-2024-45508], [CVE-2024-46478] |
USN-7225-1 -- HTMLDOC vulnerabilities |
| oval:com.ubuntu.jammy:def:72241000000 |
false |
patch |
[USN-7224-1], [CVE-2019-18928], [CVE-2021-33582], [CVE-2024-34055] |
USN-7224-1 -- Cyrus IMAP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:72231000000 |
false |
patch |
[USN-7223-1], [CVE-2024-56826], [CVE-2024-56827] |
USN-7223-1 -- OpenJPEG vulnerabilities |
| oval:com.ubuntu.jammy:def:72221000000 |
false |
patch |
[USN-7222-1], [CVE-2023-50229], [CVE-2023-50230] |
USN-7222-1 -- BlueZ vulnerabilities |
| oval:com.ubuntu.jammy:def:72201000000 |
false |
patch |
[USN-7220-1], [CVE-2025-22134] |
USN-7220-1 -- Vim vulnerability |
| oval:com.ubuntu.jammy:def:72181000000 |
false |
patch |
[USN-7218-1], [CVE-2024-11168] |
USN-7218-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:72171000000 |
false |
patch |
[USN-7217-1], [CVE-2017-5886], [CVE-2018-11255], [CVE-2018-12983], [CVE-2018-20797], [CVE-2018-5308], [CVE-2018-8002], [CVE-2019-10723], [CVE-2020-18971], [CVE-2021-30470], [CVE-2021-30471] |
USN-7217-1 -- PoDoFo library vulnerabilities |
| oval:com.ubuntu.jammy:def:72161000000 |
false |
patch |
[USN-7216-1], [CVE-2024-34062] |
USN-7216-1 -- tqdm vulnerability |
| oval:com.ubuntu.jammy:def:72131000000 |
false |
patch |
[USN-7213-1], [CVE-2024-56378] |
USN-7213-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:72121000000 |
false |
patch |
[USN-7212-1], [CVE-2019-9674], [CVE-2022-45061], [CVE-2024-0450] |
USN-7212-1 -- Python 2.7 vulnerabilities |
| oval:com.ubuntu.jammy:def:72101000000 |
false |
patch |
[USN-7210-1], [CVE-2025-21171], [CVE-2025-21172], [CVE-2025-21173], [CVE-2025-21176] |
USN-7210-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:72091000000 |
false |
patch |
[USN-7209-1], [CVE-2023-44441] |
USN-7209-1 -- GIMP DDS Plugin vulnerabilities |
| oval:com.ubuntu.jammy:def:72081000000 |
false |
patch |
[USN-7208-1], [CVE-2022-42920] |
USN-7208-1 -- Apache Commons BCEL vulnerability |
| oval:com.ubuntu.jammy:def:72071000000 |
false |
patch |
[USN-7207-1], [CVE-2024-50349], [CVE-2024-52006] |
USN-7207-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:72062000000 |
false |
patch |
[USN-7206-2] |
USN-7206-2 -- rsync regression |
| oval:com.ubuntu.jammy:def:72061000000 |
false |
patch |
[USN-7206-1], [CVE-2024-12084], [CVE-2024-12085], [CVE-2024-12086], [CVE-2024-12087], [CVE-2024-12088], [CVE-2024-12747] |
USN-7206-1 -- rsync vulnerabilities |
| oval:com.ubuntu.jammy:def:72051000000 |
false |
patch |
[USN-7205-1], [CVE-2024-56374] |
USN-7205-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:72041000000 |
false |
patch |
[USN-7204-1], [CVE-2018-14349], [CVE-2018-14350], [CVE-2018-14351], [CVE-2018-14352], [CVE-2018-14353], [CVE-2018-14354], [CVE-2018-14355], [CVE-2018-14356], [CVE-2018-14357], [CVE-2018-14358], [CVE-2018-14359], [CVE-2018-14360], [CVE-2018-14361], [CVE-2018-14362], [CVE-2018-14363], [CVE-2020-14954], [CVE-2020-28896], [CVE-2021-32055], [CVE-2022-1328], [CVE-2024-49393], [CVE-2024-49394] |
USN-7204-1 -- NeoMutt vulnerabilities |
| oval:com.ubuntu.jammy:def:72031000000 |
false |
patch |
[USN-7203-1], [CVE-2018-1046], [CVE-2018-10851], [CVE-2018-14626], [CVE-2018-14644], [CVE-2020-17482], [CVE-2022-27227] |
USN-7203-1 -- PowerDNS vulnerabilities |
| oval:com.ubuntu.jammy:def:72011000000 |
false |
patch |
[USN-7201-1], [CVE-2024-54479], [CVE-2024-54502], [CVE-2024-54505], [CVE-2024-54508] |
USN-7201-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:71991000000 |
false |
patch |
[USN-7199-1], [CVE-2015-1283], [CVE-2016-0718], [CVE-2016-4472], [CVE-2018-20843], [CVE-2019-15903], [CVE-2021-46143], [CVE-2022-22822], [CVE-2022-22823], [CVE-2022-22824], [CVE-2022-22825], [CVE-2022-22826], [CVE-2022-22827] |
USN-7199-1 -- xmltok library vulnerabilities |
| oval:com.ubuntu.jammy:def:71981000000 |
false |
patch |
[USN-7198-1], [CVE-2021-31315], [CVE-2021-31317], [CVE-2021-31318], [CVE-2021-31319], [CVE-2021-31320], [CVE-2021-31321], [CVE-2021-31322] |
USN-7198-1 -- rlottie vulnerabilities |
| oval:com.ubuntu.jammy:def:71971000000 |
false |
patch |
[USN-7197-1], [CVE-2024-45338] |
USN-7197-1 -- Go Networking vulnerability |
| oval:com.ubuntu.jammy:def:71961000000 |
false |
patch |
[USN-7196-1], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-39472], [CVE-2024-42258], [CVE-2024-42259], [CVE-2024-42260], [CVE-2024-42261], [CVE-2024-42262], [CVE-2024-42263], [CVE-2024-42264], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42268], [CVE-2024-42269], [CVE-2024-42272], [CVE-2024-42273], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42278], [CVE-2024-42279], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42291], [CVE-2024-42292], [CVE-2024-42294], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42298], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42303], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42307], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42314], [CVE-2024-42315], [CVE-2024-42316], [CVE-2024-42317], [CVE-2024-42318], [CVE-2024-42319], [CVE-2024-42320], [CVE-2024-42321], [CVE-2024-42322], [CVE-2024-43817], [CVE-2024-43818], [CVE-2024-43819], [CVE-2024-43820], [CVE-2024-43821], [CVE-2024-43823], [CVE-2024-43824], [CVE-2024-43825], [CVE-2024-43826], [CVE-2024-43827], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43831], [CVE-2024-43832], [CVE-2024-43833], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43837], [CVE-2024-43839], [CVE-2024-43840], [CVE-2024-43841], [CVE-2024-43842], [CVE-2024-43843], [CVE-2024-43845], [CVE-2024-43846], [CVE-2024-43847], [CVE-2024-43849], [CVE-2024-43850], [CVE-2024-43852], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43857], [CVE-2024-43859], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43864], [CVE-2024-43866], [CVE-2024-43867], [CVE-2024-43868], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43876], [CVE-2024-43877], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43881], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43886], [CVE-2024-43887], [CVE-2024-43888], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43891], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43895], [CVE-2024-43899], [CVE-2024-43900], [CVE-2024-43902], [CVE-2024-43904], [CVE-2024-43905], [CVE-2024-43906], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43910], [CVE-2024-43911], [CVE-2024-43912], [CVE-2024-43913], [CVE-2024-43914], [CVE-2024-44931], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44937], [CVE-2024-44938], [CVE-2024-44939], [CVE-2024-44940], [CVE-2024-44941], [CVE-2024-44942], [CVE-2024-44943], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44950], [CVE-2024-44953], [CVE-2024-44954], [CVE-2024-44956], [CVE-2024-44957], [CVE-2024-44958], [CVE-2024-44959], [CVE-2024-44960], [CVE-2024-44961], [CVE-2024-44962], [CVE-2024-44963], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44967], [CVE-2024-44969], [CVE-2024-44970], [CVE-2024-44971], [CVE-2024-44972], [CVE-2024-44973], [CVE-2024-44974], [CVE-2024-44975], [CVE-2024-44977], [CVE-2024-44978], [CVE-2024-44979], [CVE-2024-44980], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44984], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44991], [CVE-2024-44993], [CVE-2024-44995], [CVE-2024-44996], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45000], [CVE-2024-45002], [CVE-2024-45003], [CVE-2024-45005], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45010], [CVE-2024-45011], [CVE-2024-45012], [CVE-2024-45013], [CVE-2024-45015], [CVE-2024-45017], [CVE-2024-45018], [CVE-2024-45019], [CVE-2024-45020], [CVE-2024-45021], [CVE-2024-45022], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45027], [CVE-2024-45028], [CVE-2024-45029], [CVE-2024-45030], [CVE-2024-46672], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46678], [CVE-2024-46679], [CVE-2024-46680], [CVE-2024-46681], [CVE-2024-46683], [CVE-2024-46685], [CVE-2024-46686], [CVE-2024-46687], [CVE-2024-46689], [CVE-2024-46691], [CVE-2024-46692], [CVE-2024-46693], [CVE-2024-46694], [CVE-2024-46695], [CVE-2024-46697], [CVE-2024-46698], [CVE-2024-46701], [CVE-2024-46702], [CVE-2024-46703], [CVE-2024-46705], [CVE-2024-46706], [CVE-2024-46707], [CVE-2024-46708], [CVE-2024-46709], [CVE-2024-46710], [CVE-2024-46711], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46715], [CVE-2024-46716], [CVE-2024-46717], [CVE-2024-46718], [CVE-2024-46719], [CVE-2024-46720], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46726], [CVE-2024-46727], [CVE-2024-46728], [CVE-2024-46729], [CVE-2024-46730], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46733], [CVE-2024-46735], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46741], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46749], [CVE-2024-46750], [CVE-2024-46751], [CVE-2024-46752], [CVE-2024-46753], [CVE-2024-46754], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46760], [CVE-2024-46761], [CVE-2024-46762], [CVE-2024-46763], [CVE-2024-46765], [CVE-2024-46766], [CVE-2024-46767], [CVE-2024-46768], [CVE-2024-46770], [CVE-2024-46771], [CVE-2024-46772], [CVE-2024-46773], [CVE-2024-46774], [CVE-2024-46775], [CVE-2024-46776], [CVE-2024-46777], [CVE-2024-46778], [CVE-2024-46779], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46784], [CVE-2024-46785], [CVE-2024-46786], [CVE-2024-46787], [CVE-2024-46788], [CVE-2024-46791], [CVE-2024-46792], [CVE-2024-46793], [CVE-2024-46794], [CVE-2024-46795], [CVE-2024-46797], [CVE-2024-46798], [CVE-2024-46802], [CVE-2024-46803], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46806], [CVE-2024-46807], [CVE-2024-46808], [CVE-2024-46809], [CVE-2024-46810], [CVE-2024-46811], [CVE-2024-46812], [CVE-2024-46813], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46816], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46821], [CVE-2024-46822], [CVE-2024-46823], [CVE-2024-46824], [CVE-2024-46825], [CVE-2024-46826], [CVE-2024-46827], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46830], [CVE-2024-46831], [CVE-2024-46832], [CVE-2024-46834], [CVE-2024-46835], [CVE-2024-46836], [CVE-2024-46838], [CVE-2024-46840], [CVE-2024-46841], [CVE-2024-46842], [CVE-2024-46843], [CVE-2024-46844], [CVE-2024-46845], [CVE-2024-46846], [CVE-2024-46847], [CVE-2024-46848], [CVE-2024-46849], [CVE-2024-46850], [CVE-2024-46851], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46857], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46860], [CVE-2024-46861], [CVE-2024-46864], [CVE-2024-46866], [CVE-2024-46867], [CVE-2024-46868], [CVE-2024-46870], [CVE-2024-46871], [CVE-2024-47658], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47661], [CVE-2024-47662], [CVE-2024-47663], [CVE-2024-47664], [CVE-2024-47665], [CVE-2024-47666], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669], [CVE-2024-47674], [CVE-2024-47683], [CVE-2024-49967], [CVE-2024-49984], [CVE-2024-50264], [CVE-2024-53057] |
USN-7196-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:71931000000 |
false |
patch |
[USN-7193-1], [CVE-2024-11694] |
USN-7193-1 -- Thunderbird vulnerability |
| oval:com.ubuntu.jammy:def:71921000000 |
false |
patch |
[USN-7192-1], [CVE-2024-43700] |
USN-7192-1 -- xfpt vulnerability |
| oval:com.ubuntu.jammy:def:71901000000 |
false |
patch |
[USN-7190-1], [CVE-2023-49606] |
USN-7190-1 -- Tinyproxy vulnerability |
| oval:com.ubuntu.jammy:def:71862000000 |
false |
patch |
[USN-7186-2], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2023-52532], [CVE-2023-52621], [CVE-2023-52639], [CVE-2023-52904], [CVE-2023-52917], [CVE-2024-26822], [CVE-2024-26947], [CVE-2024-27072], [CVE-2024-35904], [CVE-2024-35951], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-36893], [CVE-2024-36968], [CVE-2024-38538], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38553], [CVE-2024-38632], [CVE-2024-38667], [CVE-2024-39463], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-41016], [CVE-2024-42079], [CVE-2024-42156], [CVE-2024-42158], [CVE-2024-43904], [CVE-2024-44931], [CVE-2024-44940], [CVE-2024-44942], [CVE-2024-46695], [CVE-2024-46849], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46865], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47674], [CVE-2024-47679], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47690], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47701], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47718], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47742], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49860], [CVE-2024-49863], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49871], [CVE-2024-49875], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49886], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49900], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49907], [CVE-2024-49913], [CVE-2024-49924], [CVE-2024-49927], [CVE-2024-49930], [CVE-2024-49933], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49938], [CVE-2024-49944], [CVE-2024-49946], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49952], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49967], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49975], [CVE-2024-49977], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49995], [CVE-2024-49997], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50003], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50013], [CVE-2024-50015], [CVE-2024-50019], [CVE-2024-50024], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50049], [CVE-2024-50059], [CVE-2024-50062], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50181], [CVE-2024-50184], [CVE-2024-50186], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50264], [CVE-2024-53057] |
USN-7186-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71861000000 |
false |
patch |
[USN-7186-1], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2023-52532], [CVE-2023-52621], [CVE-2023-52639], [CVE-2023-52904], [CVE-2023-52917], [CVE-2024-26822], [CVE-2024-26947], [CVE-2024-27072], [CVE-2024-35904], [CVE-2024-35951], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-36893], [CVE-2024-36968], [CVE-2024-38538], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38553], [CVE-2024-38632], [CVE-2024-38667], [CVE-2024-39463], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-41016], [CVE-2024-42079], [CVE-2024-42156], [CVE-2024-42158], [CVE-2024-43904], [CVE-2024-44931], [CVE-2024-44940], [CVE-2024-44942], [CVE-2024-46695], [CVE-2024-46849], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46865], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47674], [CVE-2024-47679], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47690], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47701], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47718], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47742], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49860], [CVE-2024-49863], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49871], [CVE-2024-49875], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49886], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49900], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49907], [CVE-2024-49913], [CVE-2024-49924], [CVE-2024-49927], [CVE-2024-49930], [CVE-2024-49933], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49938], [CVE-2024-49944], [CVE-2024-49946], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49952], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49967], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49975], [CVE-2024-49977], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49995], [CVE-2024-49997], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50003], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50013], [CVE-2024-50015], [CVE-2024-50019], [CVE-2024-50024], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50049], [CVE-2024-50059], [CVE-2024-50062], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50181], [CVE-2024-50184], [CVE-2024-50186], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191], [CVE-2024-50264], [CVE-2024-53057] |
USN-7186-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:71821000000 |
false |
patch |
[USN-7182-1], [CVE-2024-48916] |
USN-7182-1 -- Ceph vulnerability |
| oval:com.ubuntu.jammy:def:71801000000 |
false |
patch |
[USN-7180-1], [CVE-2022-48560], [CVE-2022-48565], [CVE-2022-48566], [CVE-2023-24329], [CVE-2023-40217] |
USN-7180-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:71794000000 |
false |
patch |
[USN-7179-4], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2024-26822], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-38553], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-43904], [CVE-2024-50264], [CVE-2024-53057] |
USN-7179-4 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:71793000000 |
false |
patch |
[USN-7179-3], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2024-26822], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-38553], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-43904], [CVE-2024-50264], [CVE-2024-53057] |
USN-7179-3 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:71792000000 |
false |
patch |
[USN-7179-2], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2024-26822], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-38553], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-43904], [CVE-2024-50264], [CVE-2024-53057] |
USN-7179-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71791000000 |
false |
patch |
[USN-7179-1], [CVE-2020-12351], [CVE-2020-12352], [CVE-2020-24490], [CVE-2024-26822], [CVE-2024-35963], [CVE-2024-35965], [CVE-2024-35966], [CVE-2024-35967], [CVE-2024-38553], [CVE-2024-40910], [CVE-2024-40973], [CVE-2024-43904], [CVE-2024-50264], [CVE-2024-53057] |
USN-7179-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71781000000 |
false |
patch |
[USN-7178-1], [CVE-2024-11614] |
USN-7178-1 -- DPDK vulnerability |
| oval:com.ubuntu.jammy:def:71771000000 |
false |
patch |
[USN-7177-1], [CVE-2021-45429] |
USN-7177-1 -- YARA vulnerability |
| oval:com.ubuntu.jammy:def:71761000000 |
false |
patch |
[USN-7176-1], [CVE-2024-47537], [CVE-2024-47539], [CVE-2024-47540], [CVE-2024-47543], [CVE-2024-47544], [CVE-2024-47545], [CVE-2024-47546], [CVE-2024-47596], [CVE-2024-47597], [CVE-2024-47598], [CVE-2024-47599], [CVE-2024-47601], [CVE-2024-47602], [CVE-2024-47603], [CVE-2024-47606], [CVE-2024-47613], [CVE-2024-47774], [CVE-2024-47775], [CVE-2024-47776], [CVE-2024-47777], [CVE-2024-47778], [CVE-2024-47834] |
USN-7176-1 -- GStreamer Good Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:71751000000 |
false |
patch |
[USN-7175-1], [CVE-2024-47538], [CVE-2024-47541], [CVE-2024-47542], [CVE-2024-47600], [CVE-2024-47607], [CVE-2024-47615], [CVE-2024-47835] |
USN-7175-1 -- GStreamer Base Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:71741000000 |
false |
patch |
[USN-7174-1], [CVE-2024-47606] |
USN-7174-1 -- GStreamer vulnerability |
| oval:com.ubuntu.jammy:def:71681000000 |
false |
patch |
[USN-7168-1], [CVE-2023-0341], [CVE-2024-53849] |
USN-7168-1 -- EditorConfig vulnerabilities |
| oval:com.ubuntu.jammy:def:71672000000 |
false |
patch |
[USN-7167-2], [CVE-2024-49967], [CVE-2024-50264], [CVE-2024-53057] |
USN-7167-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71671000000 |
false |
patch |
[USN-7167-1], [CVE-2024-49967], [CVE-2024-50264], [CVE-2024-53057] |
USN-7167-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71664000000 |
false |
patch |
[USN-7166-4], [CVE-2023-52532], [CVE-2023-52621], [CVE-2023-52639], [CVE-2023-52904], [CVE-2023-52917], [CVE-2024-26947], [CVE-2024-27072], [CVE-2024-35904], [CVE-2024-35951], [CVE-2024-36893], [CVE-2024-36968], [CVE-2024-38538], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38632], [CVE-2024-38667], [CVE-2024-39463], [CVE-2024-41016], [CVE-2024-42079], [CVE-2024-42156], [CVE-2024-42158], [CVE-2024-44931], [CVE-2024-44940], [CVE-2024-44942], [CVE-2024-46695], [CVE-2024-46849], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46865], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47674], [CVE-2024-47679], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47690], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47701], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47718], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47742], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49860], [CVE-2024-49863], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49871], [CVE-2024-49875], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49886], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49900], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49907], [CVE-2024-49913], [CVE-2024-49924], [CVE-2024-49927], [CVE-2024-49930], [CVE-2024-49933], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49938], [CVE-2024-49944], [CVE-2024-49946], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49952], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49967], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49975], [CVE-2024-49977], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49995], [CVE-2024-49997], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50003], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50013], [CVE-2024-50015], [CVE-2024-50019], [CVE-2024-50024], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50049], [CVE-2024-50059], [CVE-2024-50062], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50181], [CVE-2024-50184], [CVE-2024-50186], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191] |
USN-7166-4 -- Linux kernel (Xilinx ZynqMP) vulnerabilities |
| oval:com.ubuntu.jammy:def:71662000000 |
false |
patch |
[USN-7166-2], [CVE-2023-52532], [CVE-2023-52621], [CVE-2023-52639], [CVE-2023-52904], [CVE-2023-52917], [CVE-2024-26947], [CVE-2024-27072], [CVE-2024-35904], [CVE-2024-35951], [CVE-2024-36893], [CVE-2024-36968], [CVE-2024-38538], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38632], [CVE-2024-38667], [CVE-2024-39463], [CVE-2024-41016], [CVE-2024-42079], [CVE-2024-42156], [CVE-2024-42158], [CVE-2024-44931], [CVE-2024-44940], [CVE-2024-44942], [CVE-2024-46695], [CVE-2024-46849], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46865], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47674], [CVE-2024-47679], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47690], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47701], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47718], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47742], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49860], [CVE-2024-49863], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49871], [CVE-2024-49875], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49886], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49900], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49907], [CVE-2024-49913], [CVE-2024-49924], [CVE-2024-49927], [CVE-2024-49930], [CVE-2024-49933], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49938], [CVE-2024-49944], [CVE-2024-49946], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49952], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49967], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49975], [CVE-2024-49977], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49995], [CVE-2024-49997], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50003], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50013], [CVE-2024-50015], [CVE-2024-50019], [CVE-2024-50024], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50049], [CVE-2024-50059], [CVE-2024-50062], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50181], [CVE-2024-50184], [CVE-2024-50186], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191] |
USN-7166-2 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:71661000000 |
false |
patch |
[USN-7166-1], [CVE-2023-52532], [CVE-2023-52621], [CVE-2023-52639], [CVE-2023-52904], [CVE-2023-52917], [CVE-2024-26947], [CVE-2024-27072], [CVE-2024-35904], [CVE-2024-35951], [CVE-2024-36893], [CVE-2024-36968], [CVE-2024-38538], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38632], [CVE-2024-38667], [CVE-2024-39463], [CVE-2024-41016], [CVE-2024-42079], [CVE-2024-42156], [CVE-2024-42158], [CVE-2024-44931], [CVE-2024-44940], [CVE-2024-44942], [CVE-2024-46695], [CVE-2024-46849], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46865], [CVE-2024-47670], [CVE-2024-47671], [CVE-2024-47672], [CVE-2024-47673], [CVE-2024-47674], [CVE-2024-47679], [CVE-2024-47684], [CVE-2024-47685], [CVE-2024-47690], [CVE-2024-47692], [CVE-2024-47693], [CVE-2024-47695], [CVE-2024-47696], [CVE-2024-47697], [CVE-2024-47698], [CVE-2024-47699], [CVE-2024-47701], [CVE-2024-47705], [CVE-2024-47706], [CVE-2024-47709], [CVE-2024-47710], [CVE-2024-47712], [CVE-2024-47713], [CVE-2024-47718], [CVE-2024-47720], [CVE-2024-47723], [CVE-2024-47734], [CVE-2024-47735], [CVE-2024-47737], [CVE-2024-47739], [CVE-2024-47740], [CVE-2024-47742], [CVE-2024-47747], [CVE-2024-47748], [CVE-2024-47749], [CVE-2024-47756], [CVE-2024-47757], [CVE-2024-49851], [CVE-2024-49852], [CVE-2024-49856], [CVE-2024-49858], [CVE-2024-49860], [CVE-2024-49863], [CVE-2024-49866], [CVE-2024-49867], [CVE-2024-49868], [CVE-2024-49871], [CVE-2024-49875], [CVE-2024-49877], [CVE-2024-49878], [CVE-2024-49879], [CVE-2024-49881], [CVE-2024-49882], [CVE-2024-49883], [CVE-2024-49884], [CVE-2024-49886], [CVE-2024-49889], [CVE-2024-49890], [CVE-2024-49892], [CVE-2024-49894], [CVE-2024-49895], [CVE-2024-49896], [CVE-2024-49900], [CVE-2024-49902], [CVE-2024-49903], [CVE-2024-49907], [CVE-2024-49913], [CVE-2024-49924], [CVE-2024-49927], [CVE-2024-49930], [CVE-2024-49933], [CVE-2024-49935], [CVE-2024-49936], [CVE-2024-49938], [CVE-2024-49944], [CVE-2024-49946], [CVE-2024-49948], [CVE-2024-49949], [CVE-2024-49952], [CVE-2024-49954], [CVE-2024-49955], [CVE-2024-49957], [CVE-2024-49958], [CVE-2024-49959], [CVE-2024-49962], [CVE-2024-49963], [CVE-2024-49965], [CVE-2024-49966], [CVE-2024-49967], [CVE-2024-49969], [CVE-2024-49973], [CVE-2024-49975], [CVE-2024-49977], [CVE-2024-49981], [CVE-2024-49982], [CVE-2024-49983], [CVE-2024-49985], [CVE-2024-49995], [CVE-2024-49997], [CVE-2024-50000], [CVE-2024-50001], [CVE-2024-50002], [CVE-2024-50003], [CVE-2024-50006], [CVE-2024-50007], [CVE-2024-50008], [CVE-2024-50013], [CVE-2024-50015], [CVE-2024-50019], [CVE-2024-50024], [CVE-2024-50031], [CVE-2024-50033], [CVE-2024-50035], [CVE-2024-50038], [CVE-2024-50039], [CVE-2024-50040], [CVE-2024-50041], [CVE-2024-50044], [CVE-2024-50045], [CVE-2024-50046], [CVE-2024-50049], [CVE-2024-50059], [CVE-2024-50062], [CVE-2024-50093], [CVE-2024-50095], [CVE-2024-50096], [CVE-2024-50179], [CVE-2024-50180], [CVE-2024-50181], [CVE-2024-50184], [CVE-2024-50186], [CVE-2024-50188], [CVE-2024-50189], [CVE-2024-50191] |
USN-7166-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71651000000 |
false |
patch |
[USN-7165-1], [CVE-2022-22965] |
USN-7165-1 -- Spring Framework vulnerability |
| oval:com.ubuntu.jammy:def:71621000000 |
false |
patch |
[USN-7162-1], [CVE-2024-11053] |
USN-7162-1 -- curl vulnerability |
| oval:com.ubuntu.jammy:def:71613000000 |
false |
patch |
[USN-7161-3], [CVE-2024-41110] |
USN-7161-3 -- Docker vulnerability |
| oval:com.ubuntu.jammy:def:71612000000 |
false |
patch |
[USN-7161-2], [CVE-2024-29018], [CVE-2024-41110] |
USN-7161-2 -- Docker vulnerabilities |
| oval:com.ubuntu.jammy:def:71581000000 |
false |
patch |
[USN-7158-1], [CVE-2018-25047], [CVE-2023-28447], [CVE-2024-35226] |
USN-7158-1 -- Smarty vulnerabilities |
| oval:com.ubuntu.jammy:def:71571000000 |
false |
patch |
[USN-7157-1], [CVE-2024-11233], [CVE-2024-11234], [CVE-2024-11236], [CVE-2024-8929], [CVE-2024-8932] |
USN-7157-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:71551000000 |
false |
patch |
[USN-7155-1], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-39472], [CVE-2024-42258], [CVE-2024-42259], [CVE-2024-42260], [CVE-2024-42261], [CVE-2024-42262], [CVE-2024-42263], [CVE-2024-42264], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42268], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42272], [CVE-2024-42273], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42278], [CVE-2024-42279], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42291], [CVE-2024-42292], [CVE-2024-42294], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42298], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42303], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42307], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42314], [CVE-2024-42315], [CVE-2024-42316], [CVE-2024-42317], [CVE-2024-42318], [CVE-2024-42319], [CVE-2024-42320], [CVE-2024-42321], [CVE-2024-42322], [CVE-2024-43817], [CVE-2024-43818], [CVE-2024-43819], [CVE-2024-43820], [CVE-2024-43821], [CVE-2024-43823], [CVE-2024-43824], [CVE-2024-43825], [CVE-2024-43826], [CVE-2024-43827], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43831], [CVE-2024-43832], [CVE-2024-43833], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43837], [CVE-2024-43839], [CVE-2024-43840], [CVE-2024-43841], [CVE-2024-43842], [CVE-2024-43843], [CVE-2024-43845], [CVE-2024-43846], [CVE-2024-43847], [CVE-2024-43849], [CVE-2024-43850], [CVE-2024-43852], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43857], [CVE-2024-43859], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43864], [CVE-2024-43866], [CVE-2024-43867], [CVE-2024-43868], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43876], [CVE-2024-43877], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43881], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43886], [CVE-2024-43887], [CVE-2024-43888], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43891], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43895], [CVE-2024-43899], [CVE-2024-43900], [CVE-2024-43902], [CVE-2024-43904], [CVE-2024-43905], [CVE-2024-43906], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43910], [CVE-2024-43911], [CVE-2024-43912], [CVE-2024-43913], [CVE-2024-43914], [CVE-2024-44931], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44937], [CVE-2024-44938], [CVE-2024-44939], [CVE-2024-44940], [CVE-2024-44941], [CVE-2024-44942], [CVE-2024-44943], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44950], [CVE-2024-44953], [CVE-2024-44954], [CVE-2024-44956], [CVE-2024-44957], [CVE-2024-44958], [CVE-2024-44959], [CVE-2024-44960], [CVE-2024-44961], [CVE-2024-44962], [CVE-2024-44963], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44967], [CVE-2024-44969], [CVE-2024-44970], [CVE-2024-44971], [CVE-2024-44972], [CVE-2024-44973], [CVE-2024-44974], [CVE-2024-44975], [CVE-2024-44977], [CVE-2024-44978], [CVE-2024-44979], [CVE-2024-44980], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44984], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44991], [CVE-2024-44993], [CVE-2024-44995], [CVE-2024-44996], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45000], [CVE-2024-45002], [CVE-2024-45003], [CVE-2024-45005], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45010], [CVE-2024-45011], [CVE-2024-45012], [CVE-2024-45013], [CVE-2024-45015], [CVE-2024-45017], [CVE-2024-45018], [CVE-2024-45019], [CVE-2024-45020], [CVE-2024-45021], [CVE-2024-45022], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45027], [CVE-2024-45028], [CVE-2024-45029], [CVE-2024-45030], [CVE-2024-46672], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46678], [CVE-2024-46679], [CVE-2024-46680], [CVE-2024-46681], [CVE-2024-46683], [CVE-2024-46685], [CVE-2024-46686], [CVE-2024-46687], [CVE-2024-46689], [CVE-2024-46691], [CVE-2024-46692], [CVE-2024-46693], [CVE-2024-46694], [CVE-2024-46695], [CVE-2024-46697], [CVE-2024-46698], [CVE-2024-46701], [CVE-2024-46702], [CVE-2024-46703], [CVE-2024-46705], [CVE-2024-46706], [CVE-2024-46707], [CVE-2024-46708], [CVE-2024-46709], [CVE-2024-46710], [CVE-2024-46711], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46715], [CVE-2024-46716], [CVE-2024-46717], [CVE-2024-46718], [CVE-2024-46719], [CVE-2024-46720], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46726], [CVE-2024-46727], [CVE-2024-46728], [CVE-2024-46729], [CVE-2024-46730], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46733], [CVE-2024-46735], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46741], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46749], [CVE-2024-46750], [CVE-2024-46751], [CVE-2024-46752], [CVE-2024-46753], [CVE-2024-46754], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46760], [CVE-2024-46761], [CVE-2024-46762], [CVE-2024-46763], [CVE-2024-46765], [CVE-2024-46766], [CVE-2024-46767], [CVE-2024-46768], [CVE-2024-46770], [CVE-2024-46771], [CVE-2024-46772], [CVE-2024-46773], [CVE-2024-46774], [CVE-2024-46775], [CVE-2024-46776], [CVE-2024-46777], [CVE-2024-46778], [CVE-2024-46779], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46784], [CVE-2024-46785], [CVE-2024-46786], [CVE-2024-46787], [CVE-2024-46788], [CVE-2024-46791], [CVE-2024-46792], [CVE-2024-46793], [CVE-2024-46794], [CVE-2024-46795], [CVE-2024-46797], [CVE-2024-46798], [CVE-2024-46802], [CVE-2024-46803], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46806], [CVE-2024-46807], [CVE-2024-46808], [CVE-2024-46809], [CVE-2024-46810], [CVE-2024-46811], [CVE-2024-46812], [CVE-2024-46813], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46816], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46821], [CVE-2024-46822], [CVE-2024-46823], [CVE-2024-46824], [CVE-2024-46825], [CVE-2024-46826], [CVE-2024-46827], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46830], [CVE-2024-46831], [CVE-2024-46832], [CVE-2024-46834], [CVE-2024-46835], [CVE-2024-46836], [CVE-2024-46838], [CVE-2024-46840], [CVE-2024-46841], [CVE-2024-46842], [CVE-2024-46843], [CVE-2024-46844], [CVE-2024-46845], [CVE-2024-46846], [CVE-2024-46847], [CVE-2024-46848], [CVE-2024-46849], [CVE-2024-46850], [CVE-2024-46851], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46857], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46860], [CVE-2024-46861], [CVE-2024-46864], [CVE-2024-46866], [CVE-2024-46867], [CVE-2024-46868], [CVE-2024-46870], [CVE-2024-46871], [CVE-2024-47658], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47661], [CVE-2024-47662], [CVE-2024-47663], [CVE-2024-47664], [CVE-2024-47665], [CVE-2024-47666], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669], [CVE-2024-47674], [CVE-2024-47683], [CVE-2024-49984] |
USN-7155-1 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:71542000000 |
false |
patch |
[USN-7154-2], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-39472], [CVE-2024-42258], [CVE-2024-42259], [CVE-2024-42260], [CVE-2024-42261], [CVE-2024-42262], [CVE-2024-42263], [CVE-2024-42264], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42268], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42272], [CVE-2024-42273], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42278], [CVE-2024-42279], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42291], [CVE-2024-42292], [CVE-2024-42294], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42298], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42303], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42307], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42314], [CVE-2024-42315], [CVE-2024-42316], [CVE-2024-42317], [CVE-2024-42318], [CVE-2024-42319], [CVE-2024-42320], [CVE-2024-42321], [CVE-2024-42322], [CVE-2024-43817], [CVE-2024-43818], [CVE-2024-43819], [CVE-2024-43820], [CVE-2024-43821], [CVE-2024-43823], [CVE-2024-43824], [CVE-2024-43825], [CVE-2024-43826], [CVE-2024-43827], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43831], [CVE-2024-43832], [CVE-2024-43833], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43837], [CVE-2024-43839], [CVE-2024-43840], [CVE-2024-43841], [CVE-2024-43842], [CVE-2024-43843], [CVE-2024-43845], [CVE-2024-43846], [CVE-2024-43847], [CVE-2024-43849], [CVE-2024-43850], [CVE-2024-43852], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43857], [CVE-2024-43859], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43864], [CVE-2024-43866], [CVE-2024-43867], [CVE-2024-43868], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43876], [CVE-2024-43877], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43881], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43886], [CVE-2024-43887], [CVE-2024-43888], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43891], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43895], [CVE-2024-43899], [CVE-2024-43900], [CVE-2024-43902], [CVE-2024-43904], [CVE-2024-43905], [CVE-2024-43906], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43910], [CVE-2024-43911], [CVE-2024-43912], [CVE-2024-43913], [CVE-2024-43914], [CVE-2024-44931], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44937], [CVE-2024-44938], [CVE-2024-44939], [CVE-2024-44940], [CVE-2024-44941], [CVE-2024-44942], [CVE-2024-44943], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44950], [CVE-2024-44953], [CVE-2024-44954], [CVE-2024-44956], [CVE-2024-44957], [CVE-2024-44958], [CVE-2024-44959], [CVE-2024-44960], [CVE-2024-44961], [CVE-2024-44962], [CVE-2024-44963], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44967], [CVE-2024-44969], [CVE-2024-44970], [CVE-2024-44971], [CVE-2024-44972], [CVE-2024-44973], [CVE-2024-44974], [CVE-2024-44975], [CVE-2024-44977], [CVE-2024-44978], [CVE-2024-44979], [CVE-2024-44980], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44984], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44991], [CVE-2024-44993], [CVE-2024-44995], [CVE-2024-44996], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45000], [CVE-2024-45001], [CVE-2024-45002], [CVE-2024-45003], [CVE-2024-45005], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45010], [CVE-2024-45011], [CVE-2024-45012], [CVE-2024-45013], [CVE-2024-45015], [CVE-2024-45017], [CVE-2024-45018], [CVE-2024-45019], [CVE-2024-45020], [CVE-2024-45021], [CVE-2024-45022], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45027], [CVE-2024-45028], [CVE-2024-45029], [CVE-2024-45030], [CVE-2024-46672], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46678], [CVE-2024-46679], [CVE-2024-46680], [CVE-2024-46681], [CVE-2024-46683], [CVE-2024-46685], [CVE-2024-46686], [CVE-2024-46687], [CVE-2024-46689], [CVE-2024-46691], [CVE-2024-46692], [CVE-2024-46693], [CVE-2024-46694], [CVE-2024-46695], [CVE-2024-46697], [CVE-2024-46698], [CVE-2024-46701], [CVE-2024-46702], [CVE-2024-46703], [CVE-2024-46705], [CVE-2024-46706], [CVE-2024-46707], [CVE-2024-46708], [CVE-2024-46709], [CVE-2024-46710], [CVE-2024-46711], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46715], [CVE-2024-46716], [CVE-2024-46717], [CVE-2024-46718], [CVE-2024-46719], [CVE-2024-46720], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46726], [CVE-2024-46727], [CVE-2024-46728], [CVE-2024-46729], [CVE-2024-46730], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46733], [CVE-2024-46735], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46741], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46749], [CVE-2024-46750], [CVE-2024-46751], [CVE-2024-46752], [CVE-2024-46753], [CVE-2024-46754], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46760], [CVE-2024-46761], [CVE-2024-46762], [CVE-2024-46763], [CVE-2024-46765], [CVE-2024-46766], [CVE-2024-46767], [CVE-2024-46768], [CVE-2024-46770], [CVE-2024-46771], [CVE-2024-46772], [CVE-2024-46773], [CVE-2024-46774], [CVE-2024-46775], [CVE-2024-46776], [CVE-2024-46777], [CVE-2024-46778], [CVE-2024-46779], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46784], [CVE-2024-46785], [CVE-2024-46786], [CVE-2024-46787], [CVE-2024-46788], [CVE-2024-46791], [CVE-2024-46792], [CVE-2024-46793], [CVE-2024-46794], [CVE-2024-46795], [CVE-2024-46797], [CVE-2024-46798], [CVE-2024-46802], [CVE-2024-46803], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46806], [CVE-2024-46807], [CVE-2024-46808], [CVE-2024-46809], [CVE-2024-46810], [CVE-2024-46811], [CVE-2024-46812], [CVE-2024-46813], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46816], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46821], [CVE-2024-46822], [CVE-2024-46823], [CVE-2024-46824], [CVE-2024-46825], [CVE-2024-46826], [CVE-2024-46827], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46830], [CVE-2024-46831], [CVE-2024-46832], [CVE-2024-46834], [CVE-2024-46835], [CVE-2024-46836], [CVE-2024-46838], [CVE-2024-46840], [CVE-2024-46841], [CVE-2024-46842], [CVE-2024-46843], [CVE-2024-46844], [CVE-2024-46845], [CVE-2024-46846], [CVE-2024-46847], [CVE-2024-46848], [CVE-2024-46849], [CVE-2024-46850], [CVE-2024-46851], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46857], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46860], [CVE-2024-46861], [CVE-2024-46864], [CVE-2024-46866], [CVE-2024-46867], [CVE-2024-46868], [CVE-2024-46870], [CVE-2024-46871], [CVE-2024-47658], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47661], [CVE-2024-47662], [CVE-2024-47663], [CVE-2024-47664], [CVE-2024-47665], [CVE-2024-47666], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669], [CVE-2024-47674], [CVE-2024-47683], [CVE-2024-49984] |
USN-7154-2 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:71541000000 |
false |
patch |
[USN-7154-1], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-39472], [CVE-2024-42258], [CVE-2024-42259], [CVE-2024-42260], [CVE-2024-42261], [CVE-2024-42262], [CVE-2024-42263], [CVE-2024-42264], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42268], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42272], [CVE-2024-42273], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42278], [CVE-2024-42279], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42291], [CVE-2024-42292], [CVE-2024-42294], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42298], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42303], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42307], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42314], [CVE-2024-42315], [CVE-2024-42316], [CVE-2024-42317], [CVE-2024-42318], [CVE-2024-42319], [CVE-2024-42320], [CVE-2024-42321], [CVE-2024-42322], [CVE-2024-43817], [CVE-2024-43818], [CVE-2024-43819], [CVE-2024-43820], [CVE-2024-43821], [CVE-2024-43823], [CVE-2024-43824], [CVE-2024-43825], [CVE-2024-43826], [CVE-2024-43827], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43831], [CVE-2024-43832], [CVE-2024-43833], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43837], [CVE-2024-43839], [CVE-2024-43840], [CVE-2024-43841], [CVE-2024-43842], [CVE-2024-43843], [CVE-2024-43845], [CVE-2024-43846], [CVE-2024-43847], [CVE-2024-43849], [CVE-2024-43850], [CVE-2024-43852], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43857], [CVE-2024-43859], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43864], [CVE-2024-43866], [CVE-2024-43867], [CVE-2024-43868], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43876], [CVE-2024-43877], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43881], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43886], [CVE-2024-43887], [CVE-2024-43888], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43891], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43895], [CVE-2024-43899], [CVE-2024-43900], [CVE-2024-43902], [CVE-2024-43904], [CVE-2024-43905], [CVE-2024-43906], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43910], [CVE-2024-43911], [CVE-2024-43912], [CVE-2024-43913], [CVE-2024-43914], [CVE-2024-44931], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44937], [CVE-2024-44938], [CVE-2024-44939], [CVE-2024-44940], [CVE-2024-44941], [CVE-2024-44942], [CVE-2024-44943], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44950], [CVE-2024-44953], [CVE-2024-44954], [CVE-2024-44956], [CVE-2024-44957], [CVE-2024-44958], [CVE-2024-44959], [CVE-2024-44960], [CVE-2024-44961], [CVE-2024-44962], [CVE-2024-44963], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44967], [CVE-2024-44969], [CVE-2024-44970], [CVE-2024-44971], [CVE-2024-44972], [CVE-2024-44973], [CVE-2024-44974], [CVE-2024-44975], [CVE-2024-44977], [CVE-2024-44978], [CVE-2024-44979], [CVE-2024-44980], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44984], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44991], [CVE-2024-44993], [CVE-2024-44995], [CVE-2024-44996], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45000], [CVE-2024-45001], [CVE-2024-45002], [CVE-2024-45003], [CVE-2024-45005], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45010], [CVE-2024-45011], [CVE-2024-45012], [CVE-2024-45013], [CVE-2024-45015], [CVE-2024-45017], [CVE-2024-45018], [CVE-2024-45019], [CVE-2024-45020], [CVE-2024-45021], [CVE-2024-45022], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45027], [CVE-2024-45028], [CVE-2024-45029], [CVE-2024-45030], [CVE-2024-46672], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46678], [CVE-2024-46679], [CVE-2024-46680], [CVE-2024-46681], [CVE-2024-46683], [CVE-2024-46685], [CVE-2024-46686], [CVE-2024-46687], [CVE-2024-46689], [CVE-2024-46691], [CVE-2024-46692], [CVE-2024-46693], [CVE-2024-46694], [CVE-2024-46695], [CVE-2024-46697], [CVE-2024-46698], [CVE-2024-46701], [CVE-2024-46702], [CVE-2024-46703], [CVE-2024-46705], [CVE-2024-46706], [CVE-2024-46707], [CVE-2024-46708], [CVE-2024-46709], [CVE-2024-46710], [CVE-2024-46711], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46715], [CVE-2024-46716], [CVE-2024-46717], [CVE-2024-46718], [CVE-2024-46719], [CVE-2024-46720], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46726], [CVE-2024-46727], [CVE-2024-46728], [CVE-2024-46729], [CVE-2024-46730], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46733], [CVE-2024-46735], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46741], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46749], [CVE-2024-46750], [CVE-2024-46751], [CVE-2024-46752], [CVE-2024-46753], [CVE-2024-46754], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46760], [CVE-2024-46761], [CVE-2024-46762], [CVE-2024-46763], [CVE-2024-46765], [CVE-2024-46766], [CVE-2024-46767], [CVE-2024-46768], [CVE-2024-46770], [CVE-2024-46771], [CVE-2024-46772], [CVE-2024-46773], [CVE-2024-46774], [CVE-2024-46775], [CVE-2024-46776], [CVE-2024-46777], [CVE-2024-46778], [CVE-2024-46779], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46784], [CVE-2024-46785], [CVE-2024-46786], [CVE-2024-46787], [CVE-2024-46788], [CVE-2024-46791], [CVE-2024-46792], [CVE-2024-46793], [CVE-2024-46794], [CVE-2024-46795], [CVE-2024-46797], [CVE-2024-46798], [CVE-2024-46802], [CVE-2024-46803], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46806], [CVE-2024-46807], [CVE-2024-46808], [CVE-2024-46809], [CVE-2024-46810], [CVE-2024-46811], [CVE-2024-46812], [CVE-2024-46813], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46816], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46821], [CVE-2024-46822], [CVE-2024-46823], [CVE-2024-46824], [CVE-2024-46825], [CVE-2024-46826], [CVE-2024-46827], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46830], [CVE-2024-46831], [CVE-2024-46832], [CVE-2024-46834], [CVE-2024-46835], [CVE-2024-46836], [CVE-2024-46838], [CVE-2024-46840], [CVE-2024-46841], [CVE-2024-46842], [CVE-2024-46843], [CVE-2024-46844], [CVE-2024-46845], [CVE-2024-46846], [CVE-2024-46847], [CVE-2024-46848], [CVE-2024-46849], [CVE-2024-46850], [CVE-2024-46851], [CVE-2024-46852], [CVE-2024-46853], [CVE-2024-46854], [CVE-2024-46855], [CVE-2024-46857], [CVE-2024-46858], [CVE-2024-46859], [CVE-2024-46860], [CVE-2024-46861], [CVE-2024-46864], [CVE-2024-46866], [CVE-2024-46867], [CVE-2024-46868], [CVE-2024-46870], [CVE-2024-46871], [CVE-2024-47658], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47661], [CVE-2024-47662], [CVE-2024-47663], [CVE-2024-47664], [CVE-2024-47665], [CVE-2024-47666], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669], [CVE-2024-47674], [CVE-2024-47683], [CVE-2024-49984] |
USN-7154-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71511000000 |
false |
patch |
[USN-7151-1], [CVE-2023-4232], [CVE-2023-4235] |
USN-7151-1 -- oFono vulnerabilities |
| oval:com.ubuntu.jammy:def:71501000000 |
false |
patch |
[USN-7150-1], [CVE-2023-28370], [CVE-2024-52804] |
USN-7150-1 -- Tornado vulnerabilities |
| oval:com.ubuntu.jammy:def:71491000000 |
false |
patch |
[USN-7149-1], [CVE-2024-21820], [CVE-2024-21853], [CVE-2024-23918], [CVE-2024-23984], [CVE-2024-24968] |
USN-7149-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:71461000000 |
false |
patch |
[USN-7146-1], [CVE-2017-7537], [CVE-2020-25715], [CVE-2022-2414] |
USN-7146-1 -- Dogtag PKI vulnerabilities |
| oval:com.ubuntu.jammy:def:71451000000 |
false |
patch |
[USN-7145-1], [CVE-2024-50602] |
USN-7145-1 -- Expat vulnerability |
| oval:com.ubuntu.jammy:def:71441000000 |
false |
patch |
[USN-7144-1], [CVE-2022-48666], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-25744], [CVE-2024-26607], [CVE-2024-26661], [CVE-2024-26669], [CVE-2024-26800], [CVE-2024-26893], [CVE-2024-36484], [CVE-2024-38577], [CVE-2024-38602], [CVE-2024-38611], [CVE-2024-39472], [CVE-2024-40915], [CVE-2024-41011], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41022], [CVE-2024-41042], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41068], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41081], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41098], [CVE-2024-42114], [CVE-2024-42126], [CVE-2024-42246], [CVE-2024-42259], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42271], [CVE-2024-42272], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42280], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42292], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42318], [CVE-2024-43817], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43839], [CVE-2024-43841], [CVE-2024-43846], [CVE-2024-43849], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43858], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43867], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43882], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43902], [CVE-2024-43905], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43914], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44954], [CVE-2024-44958], [CVE-2024-44960], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44969], [CVE-2024-44971], [CVE-2024-44974], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44995], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45003], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45011], [CVE-2024-45018], [CVE-2024-45021], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45028], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46679], [CVE-2024-46685], [CVE-2024-46689], [CVE-2024-46702], [CVE-2024-46707], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46719], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46750], [CVE-2024-46752], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46761], [CVE-2024-46763], [CVE-2024-46771], [CVE-2024-46777], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46791], [CVE-2024-46795], [CVE-2024-46798], [CVE-2024-46800], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46807], [CVE-2024-46810], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46822], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46832], [CVE-2024-46840], [CVE-2024-46844], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47663], [CVE-2024-47665], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669] |
USN-7144-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:71421000000 |
false |
patch |
[USN-7142-1], [CVE-2024-44308], [CVE-2024-44309] |
USN-7142-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:71411000000 |
false |
patch |
[USN-7141-1], [CVE-2023-2794], [CVE-2023-4233], [CVE-2023-4234] |
USN-7141-1 -- oFono vulnerabilities |
| oval:com.ubuntu.jammy:def:71401000000 |
false |
patch |
[USN-7140-1], [CVE-2022-40468] |
USN-7140-1 -- Tinyproxy vulnerability |
| oval:com.ubuntu.jammy:def:71371000000 |
false |
patch |
[USN-7137-1], [CVE-2019-11637], [CVE-2019-11638], [CVE-2019-11639], [CVE-2019-11640], [CVE-2019-6455], [CVE-2019-6456], [CVE-2019-6457], [CVE-2019-6458], [CVE-2019-6459], [CVE-2019-6460], [CVE-2021-46019], [CVE-2021-46021], [CVE-2021-46022] |
USN-7137-1 -- recutils vulnerabilities |
| oval:com.ubuntu.jammy:def:71361000000 |
false |
patch |
[USN-7136-1], [CVE-2024-53907], [CVE-2024-53908] |
USN-7136-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:71321000000 |
false |
patch |
[USN-7132-1], [CVE-2024-10976], [CVE-2024-10977], [CVE-2024-10978], [CVE-2024-10979] |
USN-7132-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:71311000000 |
false |
patch |
[USN-7131-1], [CVE-2024-47814] |
USN-7131-1 -- Vim vulnerability |
| oval:com.ubuntu.jammy:def:71291000000 |
false |
patch |
[USN-7129-1], [CVE-2022-3008] |
USN-7129-1 -- TinyGLTF vulnerability |
| oval:com.ubuntu.jammy:def:71281000000 |
false |
patch |
[USN-7128-1], [CVE-2022-40896] |
USN-7128-1 -- Pygments vulnerability |
| oval:com.ubuntu.jammy:def:71271000000 |
false |
patch |
[USN-7127-1], [CVE-2024-52530], [CVE-2024-52531], [CVE-2024-52532] |
USN-7127-1 -- libsoup3 vulnerabilities |
| oval:com.ubuntu.jammy:def:71261000000 |
false |
patch |
[USN-7126-1], [CVE-2024-52530], [CVE-2024-52531], [CVE-2024-52532] |
USN-7126-1 -- libsoup vulnerabilities |
| oval:com.ubuntu.jammy:def:71251000000 |
false |
patch |
[USN-7125-1], [CVE-2024-38517] |
USN-7125-1 -- RapidJSON vulnerability |
| oval:com.ubuntu.jammy:def:71231000000 |
false |
patch |
[USN-7123-1], [CVE-2022-48666], [CVE-2023-52434], [CVE-2023-52572], [CVE-2023-52751], [CVE-2023-52757], [CVE-2023-52889], [CVE-2023-52918], [CVE-2023-6610], [CVE-2024-25744], [CVE-2024-26607], [CVE-2024-26661], [CVE-2024-26669], [CVE-2024-26800], [CVE-2024-26893], [CVE-2024-36484], [CVE-2024-38577], [CVE-2024-38602], [CVE-2024-38611], [CVE-2024-39472], [CVE-2024-40915], [CVE-2024-41011], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41022], [CVE-2024-41042], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41068], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41081], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41098], [CVE-2024-42114], [CVE-2024-42126], [CVE-2024-42246], [CVE-2024-42259], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42269], [CVE-2024-42271], [CVE-2024-42272], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42280], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42292], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42318], [CVE-2024-43817], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43839], [CVE-2024-43841], [CVE-2024-43846], [CVE-2024-43849], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43858], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43867], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43882], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43902], [CVE-2024-43905], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43914], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44954], [CVE-2024-44958], [CVE-2024-44960], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44969], [CVE-2024-44971], [CVE-2024-44974], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44995], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45003], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45011], [CVE-2024-45018], [CVE-2024-45021], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45028], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46679], [CVE-2024-46685], [CVE-2024-46689], [CVE-2024-46702], [CVE-2024-46707], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46719], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46750], [CVE-2024-46752], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46761], [CVE-2024-46763], [CVE-2024-46771], [CVE-2024-46777], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46791], [CVE-2024-46795], [CVE-2024-46798], [CVE-2024-46800], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46807], [CVE-2024-46810], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46822], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46832], [CVE-2024-46840], [CVE-2024-46844], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47663], [CVE-2024-47665], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669] |
USN-7123-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:71203000000 |
false |
patch |
[USN-7120-3], [CVE-2024-43882], [CVE-2024-46800] |
USN-7120-3 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:71202000000 |
false |
patch |
[USN-7120-2], [CVE-2024-43882], [CVE-2024-46800] |
USN-7120-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71201000000 |
false |
patch |
[USN-7120-1], [CVE-2024-43882], [CVE-2024-46800] |
USN-7120-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71181000000 |
false |
patch |
[USN-7118-1], [CVE-2023-40889], [CVE-2023-40890] |
USN-7118-1 -- ZBar vulnerabilities |
| oval:com.ubuntu.jammy:def:71173000000 |
false |
patch |
[USN-7117-3] |
USN-7117-3 -- needrestart regression |
| oval:com.ubuntu.jammy:def:71172000000 |
false |
patch |
[USN-7117-2] |
USN-7117-2 -- needrestart regression |
| oval:com.ubuntu.jammy:def:71171000000 |
false |
patch |
[USN-7117-1], [CVE-2024-10224], [CVE-2024-11003], [CVE-2024-48990], [CVE-2024-48991], [CVE-2024-48992] |
USN-7117-1 -- needrestart and Module::ScanDeps vulnerabilities |
| oval:com.ubuntu.jammy:def:71161000000 |
false |
patch |
[USN-7116-1], [CVE-2024-9287] |
USN-7116-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:71151000000 |
false |
patch |
[USN-7115-1], [CVE-2024-49768], [CVE-2024-49769] |
USN-7115-1 -- Waitress vulnerabilities |
| oval:com.ubuntu.jammy:def:71141000000 |
false |
patch |
[USN-7114-1], [CVE-2024-52533] |
USN-7114-1 -- GLib vulnerability |
| oval:com.ubuntu.jammy:def:71131000000 |
false |
patch |
[USN-7113-1], [CVE-2024-44244], [CVE-2024-44296] |
USN-7113-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:71121000000 |
false |
patch |
[USN-7112-1], [CVE-2021-40812] |
USN-7112-1 -- GD Graphics Library vulnerability |
| oval:com.ubuntu.jammy:def:71111000000 |
false |
patch |
[USN-7111-1], [CVE-2022-41723], [CVE-2022-41724], [CVE-2022-41725], [CVE-2023-24536], [CVE-2023-39323], [CVE-2023-45288], [CVE-2023-45290], [CVE-2024-24783], [CVE-2024-24784], [CVE-2024-24789], [CVE-2024-24791], [CVE-2024-34155], [CVE-2024-34156], [CVE-2024-34158] |
USN-7111-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:71091000000 |
false |
patch |
[USN-7109-1], [CVE-2022-41723], [CVE-2022-41724], [CVE-2022-41725], [CVE-2023-24531], [CVE-2023-24536], [CVE-2023-29402], [CVE-2023-29403], [CVE-2023-29404], [CVE-2023-29405], [CVE-2023-29406], [CVE-2023-39318], [CVE-2023-39319], [CVE-2023-39323], [CVE-2023-39325], [CVE-2023-45288], [CVE-2023-45290], [CVE-2024-24783], [CVE-2024-24784], [CVE-2024-24785], [CVE-2024-24789], [CVE-2024-24790], [CVE-2024-24791], [CVE-2024-34155], [CVE-2024-34156], [CVE-2024-34158] |
USN-7109-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:71081000000 |
false |
patch |
[USN-7108-1], [CVE-2023-46445], [CVE-2023-46446] |
USN-7108-1 -- AsyncSSH vulnerabilities |
| oval:com.ubuntu.jammy:def:71061000000 |
false |
patch |
[USN-7106-1], [CVE-2023-28708], [CVE-2023-41080], [CVE-2023-42795], [CVE-2023-45648], [CVE-2024-23672] |
USN-7106-1 -- Tomcat vulnerabilities |
| oval:com.ubuntu.jammy:def:71041000000 |
false |
patch |
[USN-7104-1], [CVE-2024-9681] |
USN-7104-1 -- curl vulnerability |
| oval:com.ubuntu.jammy:def:71031000000 |
false |
patch |
[USN-7103-1], [CVE-2024-46951], [CVE-2024-46952], [CVE-2024-46953], [CVE-2024-46954], [CVE-2024-46955], [CVE-2024-46956] |
USN-7103-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:71021000000 |
false |
patch |
[USN-7102-1], [CVE-2024-21193], [CVE-2024-21194], [CVE-2024-21196], [CVE-2024-21197], [CVE-2024-21198], [CVE-2024-21199], [CVE-2024-21201], [CVE-2024-21212], [CVE-2024-21213], [CVE-2024-21219], [CVE-2024-21230], [CVE-2024-21231], [CVE-2024-21236], [CVE-2024-21237], [CVE-2024-21239], [CVE-2024-21241] |
USN-7102-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:71011000000 |
false |
patch |
[USN-7101-1], [CVE-2024-3772] |
USN-7101-1 -- Pydantic vulnerability |
| oval:com.ubuntu.jammy:def:71002000000 |
false |
patch |
[USN-7100-2], [CVE-2022-48666], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-25744], [CVE-2024-26607], [CVE-2024-26661], [CVE-2024-26669], [CVE-2024-26800], [CVE-2024-26893], [CVE-2024-36484], [CVE-2024-38577], [CVE-2024-38602], [CVE-2024-38611], [CVE-2024-39472], [CVE-2024-40915], [CVE-2024-41011], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41022], [CVE-2024-41042], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41068], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41081], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41098], [CVE-2024-42114], [CVE-2024-42126], [CVE-2024-42246], [CVE-2024-42259], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42271], [CVE-2024-42272], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42280], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42292], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42318], [CVE-2024-43817], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43839], [CVE-2024-43841], [CVE-2024-43846], [CVE-2024-43849], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43858], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43867], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43882], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43902], [CVE-2024-43905], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43914], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44952], [CVE-2024-44954], [CVE-2024-44958], [CVE-2024-44960], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44969], [CVE-2024-44971], [CVE-2024-44974], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44995], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45003], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45011], [CVE-2024-45018], [CVE-2024-45021], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45028], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46679], [CVE-2024-46685], [CVE-2024-46689], [CVE-2024-46702], [CVE-2024-46707], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46719], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46750], [CVE-2024-46752], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46761], [CVE-2024-46763], [CVE-2024-46771], [CVE-2024-46777], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46791], [CVE-2024-46795], [CVE-2024-46798], [CVE-2024-46800], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46807], [CVE-2024-46810], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46822], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46832], [CVE-2024-46840], [CVE-2024-46844], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47663], [CVE-2024-47665], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669] |
USN-7100-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:71001000000 |
false |
patch |
[USN-7100-1], [CVE-2022-48666], [CVE-2023-52889], [CVE-2023-52918], [CVE-2024-25744], [CVE-2024-26607], [CVE-2024-26661], [CVE-2024-26669], [CVE-2024-26800], [CVE-2024-26893], [CVE-2024-36484], [CVE-2024-38577], [CVE-2024-38602], [CVE-2024-38611], [CVE-2024-39472], [CVE-2024-40915], [CVE-2024-41011], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41022], [CVE-2024-41042], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41068], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41081], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41098], [CVE-2024-42114], [CVE-2024-42126], [CVE-2024-42246], [CVE-2024-42259], [CVE-2024-42265], [CVE-2024-42267], [CVE-2024-42269], [CVE-2024-42270], [CVE-2024-42271], [CVE-2024-42272], [CVE-2024-42274], [CVE-2024-42276], [CVE-2024-42277], [CVE-2024-42280], [CVE-2024-42281], [CVE-2024-42283], [CVE-2024-42284], [CVE-2024-42285], [CVE-2024-42286], [CVE-2024-42287], [CVE-2024-42288], [CVE-2024-42289], [CVE-2024-42290], [CVE-2024-42292], [CVE-2024-42295], [CVE-2024-42296], [CVE-2024-42297], [CVE-2024-42299], [CVE-2024-42301], [CVE-2024-42302], [CVE-2024-42304], [CVE-2024-42305], [CVE-2024-42306], [CVE-2024-42309], [CVE-2024-42310], [CVE-2024-42311], [CVE-2024-42312], [CVE-2024-42313], [CVE-2024-42318], [CVE-2024-43817], [CVE-2024-43828], [CVE-2024-43829], [CVE-2024-43830], [CVE-2024-43834], [CVE-2024-43835], [CVE-2024-43839], [CVE-2024-43841], [CVE-2024-43846], [CVE-2024-43849], [CVE-2024-43853], [CVE-2024-43854], [CVE-2024-43856], [CVE-2024-43858], [CVE-2024-43860], [CVE-2024-43861], [CVE-2024-43863], [CVE-2024-43867], [CVE-2024-43869], [CVE-2024-43870], [CVE-2024-43871], [CVE-2024-43873], [CVE-2024-43875], [CVE-2024-43879], [CVE-2024-43880], [CVE-2024-43882], [CVE-2024-43883], [CVE-2024-43884], [CVE-2024-43889], [CVE-2024-43890], [CVE-2024-43892], [CVE-2024-43893], [CVE-2024-43894], [CVE-2024-43902], [CVE-2024-43905], [CVE-2024-43907], [CVE-2024-43908], [CVE-2024-43909], [CVE-2024-43914], [CVE-2024-44934], [CVE-2024-44935], [CVE-2024-44944], [CVE-2024-44946], [CVE-2024-44947], [CVE-2024-44948], [CVE-2024-44952], [CVE-2024-44954], [CVE-2024-44958], [CVE-2024-44960], [CVE-2024-44965], [CVE-2024-44966], [CVE-2024-44969], [CVE-2024-44971], [CVE-2024-44974], [CVE-2024-44982], [CVE-2024-44983], [CVE-2024-44985], [CVE-2024-44986], [CVE-2024-44987], [CVE-2024-44988], [CVE-2024-44989], [CVE-2024-44990], [CVE-2024-44995], [CVE-2024-44998], [CVE-2024-44999], [CVE-2024-45003], [CVE-2024-45006], [CVE-2024-45007], [CVE-2024-45008], [CVE-2024-45009], [CVE-2024-45011], [CVE-2024-45018], [CVE-2024-45021], [CVE-2024-45025], [CVE-2024-45026], [CVE-2024-45028], [CVE-2024-46673], [CVE-2024-46675], [CVE-2024-46676], [CVE-2024-46677], [CVE-2024-46679], [CVE-2024-46685], [CVE-2024-46689], [CVE-2024-46702], [CVE-2024-46707], [CVE-2024-46713], [CVE-2024-46714], [CVE-2024-46719], [CVE-2024-46721], [CVE-2024-46722], [CVE-2024-46723], [CVE-2024-46724], [CVE-2024-46725], [CVE-2024-46731], [CVE-2024-46732], [CVE-2024-46737], [CVE-2024-46738], [CVE-2024-46739], [CVE-2024-46740], [CVE-2024-46743], [CVE-2024-46744], [CVE-2024-46745], [CVE-2024-46746], [CVE-2024-46747], [CVE-2024-46750], [CVE-2024-46752], [CVE-2024-46755], [CVE-2024-46756], [CVE-2024-46757], [CVE-2024-46758], [CVE-2024-46759], [CVE-2024-46761], [CVE-2024-46763], [CVE-2024-46771], [CVE-2024-46777], [CVE-2024-46780], [CVE-2024-46781], [CVE-2024-46782], [CVE-2024-46783], [CVE-2024-46791], [CVE-2024-46795], [CVE-2024-46798], [CVE-2024-46800], [CVE-2024-46804], [CVE-2024-46805], [CVE-2024-46807], [CVE-2024-46810], [CVE-2024-46814], [CVE-2024-46815], [CVE-2024-46817], [CVE-2024-46818], [CVE-2024-46819], [CVE-2024-46822], [CVE-2024-46828], [CVE-2024-46829], [CVE-2024-46832], [CVE-2024-46840], [CVE-2024-46844], [CVE-2024-47659], [CVE-2024-47660], [CVE-2024-47663], [CVE-2024-47665], [CVE-2024-47667], [CVE-2024-47668], [CVE-2024-47669] |
USN-7100-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70991000000 |
false |
patch |
[USN-7099-1], [CVE-2024-21208], [CVE-2024-21210], [CVE-2024-21217], [CVE-2024-21235] |
USN-7099-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:70981000000 |
false |
patch |
[USN-7098-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21145], [CVE-2024-21147], [CVE-2024-21208], [CVE-2024-21210], [CVE-2024-21217], [CVE-2024-21235] |
USN-7098-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:70971000000 |
false |
patch |
[USN-7097-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21144], [CVE-2024-21145], [CVE-2024-21147], [CVE-2024-21208], [CVE-2024-21210], [CVE-2024-21217], [CVE-2024-21235] |
USN-7097-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:70962000000 |
false |
patch |
[USN-7096-2] |
USN-7096-2 -- OpenJDK 8 regressions |
| oval:com.ubuntu.jammy:def:70961000000 |
false |
patch |
[USN-7096-1], [CVE-2024-20918], [CVE-2024-20919], [CVE-2024-20921], [CVE-2024-20926], [CVE-2024-20945], [CVE-2024-20952], [CVE-2024-21011], [CVE-2024-21068], [CVE-2024-21085], [CVE-2024-21094], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21144], [CVE-2024-21145], [CVE-2024-21147], [CVE-2024-21208], [CVE-2024-21210], [CVE-2024-21217], [CVE-2024-21235] |
USN-7096-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:70951000000 |
false |
patch |
[USN-7095-1], [CVE-2023-52887], [CVE-2023-52888], [CVE-2024-25741], [CVE-2024-39486], [CVE-2024-39487], [CVE-2024-41007], [CVE-2024-41010], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41018], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41021], [CVE-2024-41022], [CVE-2024-41023], [CVE-2024-41025], [CVE-2024-41027], [CVE-2024-41028], [CVE-2024-41029], [CVE-2024-41030], [CVE-2024-41031], [CVE-2024-41032], [CVE-2024-41033], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41036], [CVE-2024-41037], [CVE-2024-41038], [CVE-2024-41039], [CVE-2024-41041], [CVE-2024-41042], [CVE-2024-41044], [CVE-2024-41045], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41050], [CVE-2024-41051], [CVE-2024-41052], [CVE-2024-41053], [CVE-2024-41054], [CVE-2024-41055], [CVE-2024-41056], [CVE-2024-41057], [CVE-2024-41058], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41061], [CVE-2024-41062], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41066], [CVE-2024-41067], [CVE-2024-41068], [CVE-2024-41069], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41074], [CVE-2024-41075], [CVE-2024-41076], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41079], [CVE-2024-41080], [CVE-2024-41081], [CVE-2024-41082], [CVE-2024-41083], [CVE-2024-41084], [CVE-2024-41085], [CVE-2024-41086], [CVE-2024-41087], [CVE-2024-41088], [CVE-2024-41089], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41094], [CVE-2024-41095], [CVE-2024-41096], [CVE-2024-41097], [CVE-2024-41098], [CVE-2024-42063], [CVE-2024-42064], [CVE-2024-42065], [CVE-2024-42066], [CVE-2024-42067], [CVE-2024-42068], [CVE-2024-42069], [CVE-2024-42070], [CVE-2024-42073], [CVE-2024-42074], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42079], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42088], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42091], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42100], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42103], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42108], [CVE-2024-42109], [CVE-2024-42110], [CVE-2024-42111], [CVE-2024-42112], [CVE-2024-42113], [CVE-2024-42114], [CVE-2024-42115], [CVE-2024-42117], [CVE-2024-42118], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42126], [CVE-2024-42127], [CVE-2024-42128], [CVE-2024-42129], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42132], [CVE-2024-42133], [CVE-2024-42135], [CVE-2024-42136], [CVE-2024-42137], [CVE-2024-42138], [CVE-2024-42140], [CVE-2024-42141], [CVE-2024-42142], [CVE-2024-42144], [CVE-2024-42145], [CVE-2024-42146], [CVE-2024-42147], [CVE-2024-42149], [CVE-2024-42150], [CVE-2024-42151], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42155], [CVE-2024-42156], [CVE-2024-42157], [CVE-2024-42158], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42225], [CVE-2024-42227], [CVE-2024-42229], [CVE-2024-42230], [CVE-2024-42231], [CVE-2024-42232], [CVE-2024-42234], [CVE-2024-42235], [CVE-2024-42236], [CVE-2024-42237], [CVE-2024-42238], [CVE-2024-42239], [CVE-2024-42240], [CVE-2024-42241], [CVE-2024-42243], [CVE-2024-42244], [CVE-2024-42245], [CVE-2024-42246], [CVE-2024-42247], [CVE-2024-42248], [CVE-2024-42250], [CVE-2024-42251], [CVE-2024-42252], [CVE-2024-42253], [CVE-2024-42271], [CVE-2024-42280], [CVE-2024-43855], [CVE-2024-43858], [CVE-2024-45001] |
USN-7095-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70941000000 |
false |
patch |
[USN-7094-1], [CVE-2019-20382], [CVE-2020-13765], [CVE-2020-1983], [CVE-2020-7039], [CVE-2020-8608], [CVE-2021-3592], [CVE-2021-3594], [CVE-2023-3019], [CVE-2024-4693], [CVE-2024-7730] |
USN-7094-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:70931000000 |
false |
patch |
[USN-7093-1], [CVE-2024-49767] |
USN-7093-1 -- Werkzeug vulnerability |
| oval:com.ubuntu.jammy:def:70921000000 |
false |
patch |
[USN-7092-1], [CVE-2024-10573] |
USN-7092-1 -- mpg123 vulnerability |
| oval:com.ubuntu.jammy:def:70911000000 |
false |
patch |
[USN-7091-1], [CVE-2024-35176], [CVE-2024-39908], [CVE-2024-41123], [CVE-2024-41946], [CVE-2024-49761] |
USN-7091-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:70901000000 |
false |
patch |
[USN-7090-1], [CVE-2023-52887], [CVE-2023-52888], [CVE-2024-25741], [CVE-2024-39486], [CVE-2024-39487], [CVE-2024-41007], [CVE-2024-41010], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41018], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41021], [CVE-2024-41022], [CVE-2024-41023], [CVE-2024-41025], [CVE-2024-41027], [CVE-2024-41028], [CVE-2024-41029], [CVE-2024-41030], [CVE-2024-41031], [CVE-2024-41032], [CVE-2024-41033], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41036], [CVE-2024-41037], [CVE-2024-41038], [CVE-2024-41039], [CVE-2024-41041], [CVE-2024-41042], [CVE-2024-41044], [CVE-2024-41045], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41050], [CVE-2024-41051], [CVE-2024-41052], [CVE-2024-41053], [CVE-2024-41054], [CVE-2024-41055], [CVE-2024-41056], [CVE-2024-41057], [CVE-2024-41058], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41061], [CVE-2024-41062], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41066], [CVE-2024-41067], [CVE-2024-41068], [CVE-2024-41069], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41074], [CVE-2024-41075], [CVE-2024-41076], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41079], [CVE-2024-41080], [CVE-2024-41081], [CVE-2024-41082], [CVE-2024-41083], [CVE-2024-41084], [CVE-2024-41085], [CVE-2024-41086], [CVE-2024-41087], [CVE-2024-41088], [CVE-2024-41089], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41094], [CVE-2024-41095], [CVE-2024-41096], [CVE-2024-41097], [CVE-2024-41098], [CVE-2024-42063], [CVE-2024-42064], [CVE-2024-42065], [CVE-2024-42066], [CVE-2024-42067], [CVE-2024-42068], [CVE-2024-42069], [CVE-2024-42070], [CVE-2024-42073], [CVE-2024-42074], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42079], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42088], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42091], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42100], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42103], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42108], [CVE-2024-42109], [CVE-2024-42110], [CVE-2024-42111], [CVE-2024-42112], [CVE-2024-42113], [CVE-2024-42114], [CVE-2024-42115], [CVE-2024-42117], [CVE-2024-42118], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42126], [CVE-2024-42127], [CVE-2024-42128], [CVE-2024-42129], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42132], [CVE-2024-42133], [CVE-2024-42135], [CVE-2024-42136], [CVE-2024-42137], [CVE-2024-42138], [CVE-2024-42140], [CVE-2024-42141], [CVE-2024-42142], [CVE-2024-42144], [CVE-2024-42145], [CVE-2024-42146], [CVE-2024-42147], [CVE-2024-42149], [CVE-2024-42150], [CVE-2024-42151], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42155], [CVE-2024-42156], [CVE-2024-42157], [CVE-2024-42158], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42225], [CVE-2024-42227], [CVE-2024-42229], [CVE-2024-42230], [CVE-2024-42231], [CVE-2024-42232], [CVE-2024-42234], [CVE-2024-42235], [CVE-2024-42236], [CVE-2024-42237], [CVE-2024-42238], [CVE-2024-42239], [CVE-2024-42240], [CVE-2024-42241], [CVE-2024-42243], [CVE-2024-42244], [CVE-2024-42245], [CVE-2024-42246], [CVE-2024-42247], [CVE-2024-42248], [CVE-2024-42250], [CVE-2024-42251], [CVE-2024-42252], [CVE-2024-42253], [CVE-2024-42271], [CVE-2024-42280], [CVE-2024-43855], [CVE-2024-43858], [CVE-2024-45001], [CVE-2024-45016] |
USN-7090-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70897000000 |
false |
patch |
[USN-7089-7], [CVE-2023-52887], [CVE-2023-52888], [CVE-2024-25741], [CVE-2024-39486], [CVE-2024-39487], [CVE-2024-41007], [CVE-2024-41010], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41018], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41021], [CVE-2024-41022], [CVE-2024-41023], [CVE-2024-41025], [CVE-2024-41027], [CVE-2024-41028], [CVE-2024-41029], [CVE-2024-41030], [CVE-2024-41031], [CVE-2024-41032], [CVE-2024-41033], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41036], [CVE-2024-41037], [CVE-2024-41038], [CVE-2024-41039], [CVE-2024-41041], [CVE-2024-41042], [CVE-2024-41044], [CVE-2024-41045], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41050], [CVE-2024-41051], [CVE-2024-41052], [CVE-2024-41053], [CVE-2024-41054], [CVE-2024-41055], [CVE-2024-41056], [CVE-2024-41057], [CVE-2024-41058], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41061], [CVE-2024-41062], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41066], [CVE-2024-41067], [CVE-2024-41068], [CVE-2024-41069], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41074], [CVE-2024-41075], [CVE-2024-41076], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41079], [CVE-2024-41080], [CVE-2024-41081], [CVE-2024-41082], [CVE-2024-41083], [CVE-2024-41084], [CVE-2024-41085], [CVE-2024-41086], [CVE-2024-41087], [CVE-2024-41088], [CVE-2024-41089], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41094], [CVE-2024-41095], [CVE-2024-41096], [CVE-2024-41097], [CVE-2024-41098], [CVE-2024-42063], [CVE-2024-42064], [CVE-2024-42065], [CVE-2024-42066], [CVE-2024-42067], [CVE-2024-42068], [CVE-2024-42069], [CVE-2024-42070], [CVE-2024-42073], [CVE-2024-42074], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42079], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42088], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42091], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42100], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42103], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42108], [CVE-2024-42109], [CVE-2024-42110], [CVE-2024-42111], [CVE-2024-42112], [CVE-2024-42113], [CVE-2024-42114], [CVE-2024-42115], [CVE-2024-42117], [CVE-2024-42118], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42126], [CVE-2024-42127], [CVE-2024-42128], [CVE-2024-42129], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42132], [CVE-2024-42133], [CVE-2024-42135], [CVE-2024-42136], [CVE-2024-42137], [CVE-2024-42138], [CVE-2024-42140], [CVE-2024-42141], [CVE-2024-42142], [CVE-2024-42144], [CVE-2024-42145], [CVE-2024-42146], [CVE-2024-42147], [CVE-2024-42149], [CVE-2024-42150], [CVE-2024-42151], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42155], [CVE-2024-42156], [CVE-2024-42157], [CVE-2024-42158], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42225], [CVE-2024-42227], [CVE-2024-42229], [CVE-2024-42230], [CVE-2024-42231], [CVE-2024-42232], [CVE-2024-42234], [CVE-2024-42235], [CVE-2024-42236], [CVE-2024-42237], [CVE-2024-42238], [CVE-2024-42239], [CVE-2024-42240], [CVE-2024-42241], [CVE-2024-42243], [CVE-2024-42244], [CVE-2024-42245], [CVE-2024-42246], [CVE-2024-42247], [CVE-2024-42248], [CVE-2024-42250], [CVE-2024-42251], [CVE-2024-42252], [CVE-2024-42253], [CVE-2024-42271], [CVE-2024-42280], [CVE-2024-43855], [CVE-2024-43858] |
USN-7089-7 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:70893000000 |
false |
patch |
[USN-7089-3], [CVE-2023-52887], [CVE-2023-52888], [CVE-2024-25741], [CVE-2024-39486], [CVE-2024-39487], [CVE-2024-41007], [CVE-2024-41010], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41018], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41021], [CVE-2024-41022], [CVE-2024-41023], [CVE-2024-41025], [CVE-2024-41027], [CVE-2024-41028], [CVE-2024-41029], [CVE-2024-41030], [CVE-2024-41031], [CVE-2024-41032], [CVE-2024-41033], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41036], [CVE-2024-41037], [CVE-2024-41038], [CVE-2024-41039], [CVE-2024-41041], [CVE-2024-41042], [CVE-2024-41044], [CVE-2024-41045], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41050], [CVE-2024-41051], [CVE-2024-41052], [CVE-2024-41053], [CVE-2024-41054], [CVE-2024-41055], [CVE-2024-41056], [CVE-2024-41057], [CVE-2024-41058], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41061], [CVE-2024-41062], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41066], [CVE-2024-41067], [CVE-2024-41068], [CVE-2024-41069], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41074], [CVE-2024-41075], [CVE-2024-41076], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41079], [CVE-2024-41080], [CVE-2024-41081], [CVE-2024-41082], [CVE-2024-41083], [CVE-2024-41084], [CVE-2024-41085], [CVE-2024-41086], [CVE-2024-41087], [CVE-2024-41088], [CVE-2024-41089], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41094], [CVE-2024-41095], [CVE-2024-41096], [CVE-2024-41097], [CVE-2024-41098], [CVE-2024-42063], [CVE-2024-42064], [CVE-2024-42065], [CVE-2024-42066], [CVE-2024-42067], [CVE-2024-42068], [CVE-2024-42069], [CVE-2024-42070], [CVE-2024-42073], [CVE-2024-42074], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42079], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42088], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42091], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42100], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42103], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42108], [CVE-2024-42109], [CVE-2024-42110], [CVE-2024-42111], [CVE-2024-42112], [CVE-2024-42113], [CVE-2024-42114], [CVE-2024-42115], [CVE-2024-42117], [CVE-2024-42118], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42126], [CVE-2024-42127], [CVE-2024-42128], [CVE-2024-42129], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42132], [CVE-2024-42133], [CVE-2024-42135], [CVE-2024-42136], [CVE-2024-42137], [CVE-2024-42138], [CVE-2024-42140], [CVE-2024-42141], [CVE-2024-42142], [CVE-2024-42144], [CVE-2024-42145], [CVE-2024-42146], [CVE-2024-42147], [CVE-2024-42149], [CVE-2024-42150], [CVE-2024-42151], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42155], [CVE-2024-42156], [CVE-2024-42157], [CVE-2024-42158], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42225], [CVE-2024-42227], [CVE-2024-42229], [CVE-2024-42230], [CVE-2024-42231], [CVE-2024-42232], [CVE-2024-42234], [CVE-2024-42235], [CVE-2024-42236], [CVE-2024-42237], [CVE-2024-42238], [CVE-2024-42239], [CVE-2024-42240], [CVE-2024-42241], [CVE-2024-42243], [CVE-2024-42244], [CVE-2024-42245], [CVE-2024-42246], [CVE-2024-42247], [CVE-2024-42248], [CVE-2024-42250], [CVE-2024-42251], [CVE-2024-42252], [CVE-2024-42253], [CVE-2024-42271], [CVE-2024-42280], [CVE-2024-43855], [CVE-2024-43858] |
USN-7089-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70891000000 |
false |
patch |
[USN-7089-1], [CVE-2023-52887], [CVE-2023-52888], [CVE-2024-25741], [CVE-2024-39486], [CVE-2024-39487], [CVE-2024-41007], [CVE-2024-41010], [CVE-2024-41012], [CVE-2024-41015], [CVE-2024-41017], [CVE-2024-41018], [CVE-2024-41019], [CVE-2024-41020], [CVE-2024-41021], [CVE-2024-41022], [CVE-2024-41023], [CVE-2024-41025], [CVE-2024-41027], [CVE-2024-41028], [CVE-2024-41029], [CVE-2024-41030], [CVE-2024-41031], [CVE-2024-41032], [CVE-2024-41033], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41036], [CVE-2024-41037], [CVE-2024-41038], [CVE-2024-41039], [CVE-2024-41041], [CVE-2024-41042], [CVE-2024-41044], [CVE-2024-41045], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41050], [CVE-2024-41051], [CVE-2024-41052], [CVE-2024-41053], [CVE-2024-41054], [CVE-2024-41055], [CVE-2024-41056], [CVE-2024-41057], [CVE-2024-41058], [CVE-2024-41059], [CVE-2024-41060], [CVE-2024-41061], [CVE-2024-41062], [CVE-2024-41063], [CVE-2024-41064], [CVE-2024-41065], [CVE-2024-41066], [CVE-2024-41067], [CVE-2024-41068], [CVE-2024-41069], [CVE-2024-41070], [CVE-2024-41071], [CVE-2024-41072], [CVE-2024-41073], [CVE-2024-41074], [CVE-2024-41075], [CVE-2024-41076], [CVE-2024-41077], [CVE-2024-41078], [CVE-2024-41079], [CVE-2024-41080], [CVE-2024-41081], [CVE-2024-41082], [CVE-2024-41083], [CVE-2024-41084], [CVE-2024-41085], [CVE-2024-41086], [CVE-2024-41087], [CVE-2024-41088], [CVE-2024-41089], [CVE-2024-41090], [CVE-2024-41091], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41094], [CVE-2024-41095], [CVE-2024-41096], [CVE-2024-41097], [CVE-2024-41098], [CVE-2024-42063], [CVE-2024-42064], [CVE-2024-42065], [CVE-2024-42066], [CVE-2024-42067], [CVE-2024-42068], [CVE-2024-42069], [CVE-2024-42070], [CVE-2024-42073], [CVE-2024-42074], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42079], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42088], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42091], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42100], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42103], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42108], [CVE-2024-42109], [CVE-2024-42110], [CVE-2024-42111], [CVE-2024-42112], [CVE-2024-42113], [CVE-2024-42114], [CVE-2024-42115], [CVE-2024-42117], [CVE-2024-42118], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42126], [CVE-2024-42127], [CVE-2024-42128], [CVE-2024-42129], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42132], [CVE-2024-42133], [CVE-2024-42135], [CVE-2024-42136], [CVE-2024-42137], [CVE-2024-42138], [CVE-2024-42140], [CVE-2024-42141], [CVE-2024-42142], [CVE-2024-42144], [CVE-2024-42145], [CVE-2024-42146], [CVE-2024-42147], [CVE-2024-42149], [CVE-2024-42150], [CVE-2024-42151], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42155], [CVE-2024-42156], [CVE-2024-42157], [CVE-2024-42158], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42225], [CVE-2024-42227], [CVE-2024-42229], [CVE-2024-42230], [CVE-2024-42231], [CVE-2024-42232], [CVE-2024-42234], [CVE-2024-42235], [CVE-2024-42236], [CVE-2024-42237], [CVE-2024-42238], [CVE-2024-42239], [CVE-2024-42240], [CVE-2024-42241], [CVE-2024-42243], [CVE-2024-42244], [CVE-2024-42245], [CVE-2024-42246], [CVE-2024-42247], [CVE-2024-42248], [CVE-2024-42250], [CVE-2024-42251], [CVE-2024-42252], [CVE-2024-42253], [CVE-2024-42271], [CVE-2024-42280], [CVE-2024-43855], [CVE-2024-43858] |
USN-7089-1 -- Linux kernel kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70871000000 |
false |
patch |
[USN-7087-1], [CVE-2024-20696] |
USN-7087-1 -- libarchive vulnerability |
| oval:com.ubuntu.jammy:def:70851000000 |
false |
patch |
[USN-7085-1], [CVE-2024-9632] |
USN-7085-1 -- X.Org X Server vulnerability |
| oval:com.ubuntu.jammy:def:70842000000 |
false |
patch |
[USN-7084-2], [CVE-2024-37891] |
USN-7084-2 -- pip vulnerability |
| oval:com.ubuntu.jammy:def:70841000000 |
false |
patch |
[USN-7084-1], [CVE-2024-37891] |
USN-7084-1 -- urllib3 vulnerability |
| oval:com.ubuntu.jammy:def:70831000000 |
false |
patch |
[USN-7083-1], [CVE-2021-29338], [CVE-2021-3575], [CVE-2022-1122] |
USN-7083-1 -- OpenJPEG vulnerabilities |
| oval:com.ubuntu.jammy:def:70811000000 |
false |
patch |
[USN-7081-1], [CVE-2024-24791], [CVE-2024-34155], [CVE-2024-34156], [CVE-2024-34158] |
USN-7081-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:70801000000 |
false |
patch |
[USN-7080-1], [CVE-2024-8508] |
USN-7080-1 -- Unbound vulnerability |
| oval:com.ubuntu.jammy:def:70791000000 |
false |
patch |
[USN-7079-1], [CVE-2024-40866], [CVE-2024-44187] |
USN-7079-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:70771000000 |
false |
patch |
[USN-7077-1], [CVE-2023-31315] |
USN-7077-1 -- AMD Microcode vulnerability |
| oval:com.ubuntu.jammy:def:70761000000 |
false |
patch |
[USN-7076-1], [CVE-2024-27397], [CVE-2024-38630], [CVE-2024-45001], [CVE-2024-45016] |
USN-7076-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:70722000000 |
false |
patch |
[USN-7072-2], [CVE-2024-27397], [CVE-2024-38630], [CVE-2024-45016] |
USN-7072-2 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:70721000000 |
false |
patch |
[USN-7072-1], [CVE-2024-27397], [CVE-2024-38630], [CVE-2024-45016] |
USN-7072-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70711000000 |
false |
patch |
[USN-7071-1], [CVE-2024-45016] |
USN-7071-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:70701000000 |
false |
patch |
[USN-7070-1], [CVE-2022-36227], [CVE-2024-48957], [CVE-2024-48958] |
USN-7070-1 -- libarchive vulnerabilities |
| oval:com.ubuntu.jammy:def:70661000000 |
false |
patch |
[USN-7066-1], [CVE-2024-9680] |
USN-7066-1 -- Thunderbird vulnerability |
| oval:com.ubuntu.jammy:def:70641000000 |
false |
patch |
[USN-7064-1], [CVE-2024-5742] |
USN-7064-1 -- nano vulnerability |
| oval:com.ubuntu.jammy:def:70631000000 |
false |
patch |
[USN-7063-1], [CVE-2024-6388] |
USN-7063-1 -- Ubuntu Advantage Desktop Daemon vulnerability |
| oval:com.ubuntu.jammy:def:70621000000 |
false |
patch |
[USN-7062-1], [CVE-2024-36474], [CVE-2024-42415] |
USN-7062-1 -- libgsf vulnerabilities |
| oval:com.ubuntu.jammy:def:70611000000 |
false |
patch |
[USN-7061-1], [CVE-2023-24531], [CVE-2023-24538], [CVE-2023-29402], [CVE-2023-29403], [CVE-2023-29404], [CVE-2023-29405], [CVE-2023-29406], [CVE-2023-39318], [CVE-2023-39319], [CVE-2023-39325], [CVE-2024-24785] |
USN-7061-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:70601000000 |
false |
patch |
[USN-7060-1], [CVE-2019-0161], [CVE-2021-28210], [CVE-2021-28211], [CVE-2021-38575], [CVE-2021-38578], [CVE-2022-1292] |
USN-7060-1 -- EDK II vulnerabilities |
| oval:com.ubuntu.jammy:def:70591000000 |
false |
patch |
[USN-7059-1], [CVE-2024-47191] |
USN-7059-1 -- OATH Toolkit vulnerability |
| oval:com.ubuntu.jammy:def:70581000000 |
false |
patch |
[USN-7058-1], [CVE-2024-38229], [CVE-2024-43483], [CVE-2024-43484], [CVE-2024-43485] |
USN-7058-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:70572000000 |
false |
patch |
[USN-7057-2], [CVE-2024-47220] |
USN-7057-2 -- WEBrick vulnerability |
| oval:com.ubuntu.jammy:def:70551000000 |
false |
patch |
[USN-7055-1], [CVE-2024-3596] |
USN-7055-1 -- FreeRADIUS vulnerability |
| oval:com.ubuntu.jammy:def:70511000000 |
false |
patch |
[USN-7051-1], [CVE-2023-48795] |
USN-7051-1 -- AsyncSSH vulnerability |
| oval:com.ubuntu.jammy:def:70501000000 |
false |
patch |
[USN-7050-1], [CVE-2021-43177], [CVE-2024-8796] |
USN-7050-1 -- Devise-Two-Factor vulnerabilities |
| oval:com.ubuntu.jammy:def:70491000000 |
false |
patch |
[USN-7049-1], [CVE-2024-8925], [CVE-2024-8927], [CVE-2024-9026] |
USN-7049-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:70481000000 |
false |
patch |
[USN-7048-1], [CVE-2024-43802] |
USN-7048-1 -- Vim vulnerability |
| oval:com.ubuntu.jammy:def:70461000000 |
false |
patch |
[USN-7046-1], [CVE-2024-42472] |
USN-7046-1 -- Flatpak and Bubblewrap vulnerability |
| oval:com.ubuntu.jammy:def:70434000000 |
false |
patch |
[USN-7043-4], [CVE-2024-47076], [CVE-2024-47176] |
USN-7043-4 -- cups-filters vulnerabilities |
| oval:com.ubuntu.jammy:def:70431000000 |
false |
patch |
[USN-7043-1], [CVE-2024-47176], [CVE-2024-47076] |
USN-7043-1 -- cups-filters vulnerabilities |
| oval:com.ubuntu.jammy:def:70411000000 |
false |
patch |
[USN-7041-1], [CVE-2024-47175] |
USN-7041-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:70401000000 |
false |
patch |
[USN-7040-1], [CVE-2023-26112] |
USN-7040-1 -- ConfigObj vulnerability |
| oval:com.ubuntu.jammy:def:70381000000 |
false |
patch |
[USN-7038-1], [CVE-2023-49582] |
USN-7038-1 -- APR vulnerability |
| oval:com.ubuntu.jammy:def:70371000000 |
false |
patch |
[USN-7037-1], [CVE-2023-39327] |
USN-7037-1 -- OpenJPEG vulnerability |
| oval:com.ubuntu.jammy:def:70361000000 |
false |
patch |
[USN-7036-1], [CVE-2022-30122], [CVE-2022-30123], [CVE-2022-44570], [CVE-2022-44571], [CVE-2022-44572], [CVE-2023-27530], [CVE-2023-27539], [CVE-2024-25126], [CVE-2024-26141], [CVE-2024-26146] |
USN-7036-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:70351000000 |
false |
patch |
[USN-7035-1], [CVE-2016-1585] |
USN-7035-1 -- AppArmor vulnerability |
| oval:com.ubuntu.jammy:def:70341000000 |
false |
patch |
[USN-7034-1] |
USN-7034-1 -- ca-certificates update |
| oval:com.ubuntu.jammy:def:70331000000 |
false |
patch |
[USN-7033-1], [CVE-2024-23984], [CVE-2024-24968] |
USN-7033-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:70321000000 |
false |
patch |
[USN-7032-1], [CVE-2023-46589] |
USN-7032-1 -- Tomcat vulnerability |
| oval:com.ubuntu.jammy:def:70312000000 |
false |
patch |
[USN-7031-2], [CVE-2024-45614] |
USN-7031-2 -- Puma vulnerability |
| oval:com.ubuntu.jammy:def:70301000000 |
false |
patch |
[USN-7030-1], [CVE-2022-44900] |
USN-7030-1 -- py7zr vulnerability |
| oval:com.ubuntu.jammy:def:70291000000 |
false |
patch |
[USN-7029-1], [CVE-2022-48772], [CVE-2023-52884], [CVE-2024-23848], [CVE-2024-31076], [CVE-2024-32936], [CVE-2024-33619], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34030], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-36015], [CVE-2024-36244], [CVE-2024-36270], [CVE-2024-36281], [CVE-2024-36286], [CVE-2024-36288], [CVE-2024-36477], [CVE-2024-36478], [CVE-2024-36479], [CVE-2024-36481], [CVE-2024-36484], [CVE-2024-36489], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36973], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37021], [CVE-2024-37026], [CVE-2024-37078], [CVE-2024-37354], [CVE-2024-37356], [CVE-2024-38306], [CVE-2024-38381], [CVE-2024-38384], [CVE-2024-38385], [CVE-2024-38388], [CVE-2024-38390], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38622], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38625], [CVE-2024-38627], [CVE-2024-38628], [CVE-2024-38629], [CVE-2024-38630], [CVE-2024-38632], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38636], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38663], [CVE-2024-38664], [CVE-2024-38667], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39291], [CVE-2024-39292], [CVE-2024-39296], [CVE-2024-39298], [CVE-2024-39301], [CVE-2024-39371], [CVE-2024-39461], [CVE-2024-39462], [CVE-2024-39463], [CVE-2024-39464], [CVE-2024-39465], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39470], [CVE-2024-39471], [CVE-2024-39473], [CVE-2024-39474], [CVE-2024-39475], [CVE-2024-39478], [CVE-2024-39479], [CVE-2024-39480], [CVE-2024-39481], [CVE-2024-39483], [CVE-2024-39484], [CVE-2024-39485], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39491], [CVE-2024-39492], [CVE-2024-39493], [CVE-2024-39494], [CVE-2024-39495], [CVE-2024-39496], [CVE-2024-39497], [CVE-2024-39498], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39504], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39508], [CVE-2024-39509], [CVE-2024-39510], [CVE-2024-40899], [CVE-2024-40900], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40903], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40906], [CVE-2024-40908], [CVE-2024-40909], [CVE-2024-40910], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40913], [CVE-2024-40914], [CVE-2024-40915], [CVE-2024-40916], [CVE-2024-40917], [CVE-2024-40918], [CVE-2024-40919], [CVE-2024-40920], [CVE-2024-40921], [CVE-2024-40922], [CVE-2024-40923], [CVE-2024-40924], [CVE-2024-40925], [CVE-2024-40926], [CVE-2024-40927], [CVE-2024-40928], [CVE-2024-40929], [CVE-2024-40930], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40933], [CVE-2024-40934], [CVE-2024-40935], [CVE-2024-40936], [CVE-2024-40937], [CVE-2024-40938], [CVE-2024-40939], [CVE-2024-40940], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40944], [CVE-2024-40945], [CVE-2024-40947], [CVE-2024-40948], [CVE-2024-40949], [CVE-2024-40951], [CVE-2024-40952], [CVE-2024-40953], [CVE-2024-40954], [CVE-2024-40955], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40962], [CVE-2024-40963], [CVE-2024-40964], [CVE-2024-40965], [CVE-2024-40966], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40969], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40972], [CVE-2024-40973], [CVE-2024-40974], [CVE-2024-40975], [CVE-2024-40976], [CVE-2024-40977], [CVE-2024-40978], [CVE-2024-40979], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40982], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40985], [CVE-2024-40986], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40989], [CVE-2024-40990], [CVE-2024-40992], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-40996], [CVE-2024-40997], [CVE-2024-40998], [CVE-2024-40999], [CVE-2024-41000], [CVE-2024-41001], [CVE-2024-41002], [CVE-2024-41003], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41009], [CVE-2024-42078], [CVE-2024-42148], [CVE-2024-42154], [CVE-2024-42159], [CVE-2024-42160], [CVE-2024-42224], [CVE-2024-42228] |
USN-7029-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70271000000 |
false |
patch |
[USN-7027-1], [CVE-2022-45939], [CVE-2022-48337], [CVE-2022-48338], [CVE-2022-48339], [CVE-2023-28617], [CVE-2024-30203], [CVE-2024-30204], [CVE-2024-30205], [CVE-2024-39331] |
USN-7027-1 -- Emacs vulnerabilities |
| oval:com.ubuntu.jammy:def:70251000000 |
false |
patch |
[USN-7025-1], [CVE-2024-7788] |
USN-7025-1 -- LibreOffice vulnerability |
| oval:com.ubuntu.jammy:def:70215000000 |
false |
patch |
[USN-7021-5], [CVE-2024-26677], [CVE-2024-27012], [CVE-2024-38570], [CVE-2024-39494], [CVE-2024-39496], [CVE-2024-41009], [CVE-2024-42160], [CVE-2024-42228] |
USN-7021-5 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70213000000 |
false |
patch |
[USN-7021-3], [CVE-2024-26677], [CVE-2024-27012], [CVE-2024-38570], [CVE-2024-39494], [CVE-2024-39496], [CVE-2024-41009], [CVE-2024-42160], [CVE-2024-42228] |
USN-7021-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70212000000 |
false |
patch |
[USN-7021-2], [CVE-2024-26677], [CVE-2024-27012], [CVE-2024-38570], [CVE-2024-39494], [CVE-2024-39496], [CVE-2024-41009], [CVE-2024-42160], [CVE-2024-42228] |
USN-7021-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70211000000 |
false |
patch |
[USN-7021-1], [CVE-2024-26677], [CVE-2024-27012], [CVE-2024-38570], [CVE-2024-39494], [CVE-2024-39496], [CVE-2024-41009], [CVE-2024-42160], [CVE-2024-42228] |
USN-7021-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70204000000 |
false |
patch |
[USN-7020-4], [CVE-2024-41009], [CVE-2024-42154], [CVE-2024-42159], [CVE-2024-42160], [CVE-2024-42224], [CVE-2024-42228] |
USN-7020-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70201000000 |
false |
patch |
[USN-7020-1], [CVE-2024-41009], [CVE-2024-42154], [CVE-2024-42159], [CVE-2024-42160], [CVE-2024-42224], [CVE-2024-42228] |
USN-7020-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70191000000 |
false |
patch |
[USN-7019-1], [CVE-2022-38096], [CVE-2022-48772], [CVE-2022-48808], [CVE-2023-52488], [CVE-2023-52585], [CVE-2023-52629], [CVE-2023-52699], [CVE-2023-52752], [CVE-2023-52760], [CVE-2023-52880], [CVE-2023-52882], [CVE-2023-52884], [CVE-2023-52887], [CVE-2024-23307], [CVE-2024-23848], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-25741], [CVE-2024-25742], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26654], [CVE-2024-26680], [CVE-2024-26687], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26817], [CVE-2024-26828], [CVE-2024-26830], [CVE-2024-26886], [CVE-2024-26900], [CVE-2024-26921], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26936], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26952], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26980], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27017], [CVE-2024-27018], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27059], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27401], [CVE-2024-27437], [CVE-2024-31076], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35815], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35847], [CVE-2024-35848], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35902], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35927], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35947], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36014], [CVE-2024-36015], [CVE-2024-36016], [CVE-2024-36017], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029], [CVE-2024-36031], [CVE-2024-36032], [CVE-2024-36270], [CVE-2024-36286], [CVE-2024-36489], [CVE-2024-36880], [CVE-2024-36883], [CVE-2024-36886], [CVE-2024-36889], [CVE-2024-36894], [CVE-2024-36901], [CVE-2024-36902], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36916], [CVE-2024-36919], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36931], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36950], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36957], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36967], [CVE-2024-36969], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36974], [CVE-2024-36975], [CVE-2024-36978], [CVE-2024-37078], [CVE-2024-37356], [CVE-2024-38546], [CVE-2024-38547], [CVE-2024-38548], [CVE-2024-38549], [CVE-2024-38550], [CVE-2024-38552], [CVE-2024-38555], [CVE-2024-38558], [CVE-2024-38559], [CVE-2024-38560], [CVE-2024-38565], [CVE-2024-38567], [CVE-2024-38571], [CVE-2024-38573], [CVE-2024-38578], [CVE-2024-38579], [CVE-2024-38580], [CVE-2024-38582], [CVE-2024-38583], [CVE-2024-38586], [CVE-2024-38588], [CVE-2024-38589], [CVE-2024-38590], [CVE-2024-38591], [CVE-2024-38596], [CVE-2024-38597], [CVE-2024-38598], [CVE-2024-38599], [CVE-2024-38600], [CVE-2024-38601], [CVE-2024-38605], [CVE-2024-38607], [CVE-2024-38610], [CVE-2024-38612], [CVE-2024-38613], [CVE-2024-38615], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38627], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39292], [CVE-2024-39301], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39471], [CVE-2024-39475], [CVE-2024-39480], [CVE-2024-39482], [CVE-2024-39484], [CVE-2024-39487], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39495], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39509], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40908], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40914], [CVE-2024-40916], [CVE-2024-40927], [CVE-2024-40929], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40934], [CVE-2024-40937], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40945], [CVE-2024-40954], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40963], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40974], [CVE-2024-40976], [CVE-2024-40978], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40990], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-41000], [CVE-2024-41002], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41007], [CVE-2024-41027], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41040], [CVE-2024-41041], [CVE-2024-41044], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41055], [CVE-2024-41087], [CVE-2024-41089], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41095], [CVE-2024-41097], [CVE-2024-42068], [CVE-2024-42070], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42109], [CVE-2024-42115], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42127], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42137], [CVE-2024-42140], [CVE-2024-42145], [CVE-2024-42148], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42154], [CVE-2024-42157], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42224], [CVE-2024-42225], [CVE-2024-42229], [CVE-2024-42232], [CVE-2024-42236], [CVE-2024-42240], [CVE-2024-42244], [CVE-2024-42247] |
USN-7019-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70161000000 |
false |
patch |
[USN-7016-1], [CVE-2024-44070] |
USN-7016-1 -- FRR vulnerability |
| oval:com.ubuntu.jammy:def:70156000000 |
false |
patch |
[USN-7015-6] |
USN-7015-6 -- Python regressions |
| oval:com.ubuntu.jammy:def:70155000000 |
false |
patch |
[USN-7015-5], [CVE-2024-6232], [CVE-2024-6923] |
USN-7015-5 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:70153000000 |
false |
patch |
[USN-7015-3], [CVE-2023-27043] |
USN-7015-3 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:70152000000 |
false |
patch |
[USN-7015-2], [CVE-2024-6232], [CVE-2024-7592] |
USN-7015-2 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:70151000000 |
false |
patch |
[USN-7015-1], [CVE-2023-27043], [CVE-2024-6232], [CVE-2024-6923], [CVE-2024-7592], [CVE-2024-8088] |
USN-7015-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:70141000000 |
false |
patch |
[USN-7014-1], [CVE-2024-7347] |
USN-7014-1 -- nginx vulnerability |
| oval:com.ubuntu.jammy:def:70131000000 |
false |
patch |
[USN-7013-1], [CVE-2024-23184], [CVE-2024-23185] |
USN-7013-1 -- Dovecot vulnerabilities |
| oval:com.ubuntu.jammy:def:70121000000 |
false |
patch |
[USN-7012-1], [CVE-2024-8096] |
USN-7012-1 -- curl vulnerability |
| oval:com.ubuntu.jammy:def:70111000000 |
false |
patch |
[USN-7011-1], [CVE-2024-20505], [CVE-2024-20506] |
USN-7011-1 -- ClamAV vulnerabilities |
| oval:com.ubuntu.jammy:def:70101000000 |
false |
patch |
[USN-7010-1], [CVE-2021-41687], [CVE-2021-41688], [CVE-2021-41689], [CVE-2021-41690], [CVE-2022-2121], [CVE-2022-43272], [CVE-2024-28130], [CVE-2024-34508], [CVE-2024-34509] |
USN-7010-1 -- DCMTK vulnerabilities |
| oval:com.ubuntu.jammy:def:70091000000 |
false |
patch |
[USN-7009-1], [CVE-2022-48772], [CVE-2023-52884], [CVE-2023-52887], [CVE-2024-23848], [CVE-2024-25741], [CVE-2024-31076], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-36014], [CVE-2024-36015], [CVE-2024-36032], [CVE-2024-36270], [CVE-2024-36286], [CVE-2024-36489], [CVE-2024-36894], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37078], [CVE-2024-37356], [CVE-2024-38381], [CVE-2024-38546], [CVE-2024-38547], [CVE-2024-38548], [CVE-2024-38549], [CVE-2024-38550], [CVE-2024-38552], [CVE-2024-38555], [CVE-2024-38558], [CVE-2024-38559], [CVE-2024-38560], [CVE-2024-38565], [CVE-2024-38567], [CVE-2024-38571], [CVE-2024-38573], [CVE-2024-38578], [CVE-2024-38579], [CVE-2024-38580], [CVE-2024-38582], [CVE-2024-38583], [CVE-2024-38586], [CVE-2024-38587], [CVE-2024-38588], [CVE-2024-38589], [CVE-2024-38590], [CVE-2024-38591], [CVE-2024-38596], [CVE-2024-38597], [CVE-2024-38598], [CVE-2024-38599], [CVE-2024-38601], [CVE-2024-38605], [CVE-2024-38607], [CVE-2024-38610], [CVE-2024-38612], [CVE-2024-38613], [CVE-2024-38615], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38627], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39301], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39471], [CVE-2024-39475], [CVE-2024-39480], [CVE-2024-39482], [CVE-2024-39487], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39493], [CVE-2024-39495], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39509], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40908], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40914], [CVE-2024-40916], [CVE-2024-40927], [CVE-2024-40929], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40934], [CVE-2024-40937], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40945], [CVE-2024-40954], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40963], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40974], [CVE-2024-40976], [CVE-2024-40978], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40990], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-41000], [CVE-2024-41002], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41007], [CVE-2024-41027], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41040], [CVE-2024-41041], [CVE-2024-41044], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41055], [CVE-2024-41087], [CVE-2024-41089], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41095], [CVE-2024-41097], [CVE-2024-42068], [CVE-2024-42070], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42109], [CVE-2024-42115], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42127], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42137], [CVE-2024-42140], [CVE-2024-42145], [CVE-2024-42148], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42154], [CVE-2024-42157], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42224], [CVE-2024-42225], [CVE-2024-42229], [CVE-2024-42232], [CVE-2024-42236], [CVE-2024-42240], [CVE-2024-42244], [CVE-2024-42247], [CVE-2024-42270] |
USN-7009-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70081000000 |
false |
patch |
[USN-7008-1], [CVE-2022-48772], [CVE-2023-52884], [CVE-2024-23848], [CVE-2024-31076], [CVE-2024-32936], [CVE-2024-33619], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34030], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-36015], [CVE-2024-36244], [CVE-2024-36270], [CVE-2024-36281], [CVE-2024-36286], [CVE-2024-36288], [CVE-2024-36477], [CVE-2024-36478], [CVE-2024-36479], [CVE-2024-36481], [CVE-2024-36484], [CVE-2024-36489], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36973], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37021], [CVE-2024-37026], [CVE-2024-37078], [CVE-2024-37354], [CVE-2024-37356], [CVE-2024-38306], [CVE-2024-38381], [CVE-2024-38384], [CVE-2024-38385], [CVE-2024-38388], [CVE-2024-38390], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38622], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38625], [CVE-2024-38627], [CVE-2024-38628], [CVE-2024-38629], [CVE-2024-38630], [CVE-2024-38632], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38636], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38663], [CVE-2024-38664], [CVE-2024-38667], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39291], [CVE-2024-39292], [CVE-2024-39296], [CVE-2024-39298], [CVE-2024-39301], [CVE-2024-39371], [CVE-2024-39461], [CVE-2024-39462], [CVE-2024-39463], [CVE-2024-39464], [CVE-2024-39465], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39470], [CVE-2024-39471], [CVE-2024-39473], [CVE-2024-39474], [CVE-2024-39475], [CVE-2024-39478], [CVE-2024-39479], [CVE-2024-39480], [CVE-2024-39481], [CVE-2024-39483], [CVE-2024-39484], [CVE-2024-39485], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39491], [CVE-2024-39492], [CVE-2024-39493], [CVE-2024-39494], [CVE-2024-39495], [CVE-2024-39496], [CVE-2024-39497], [CVE-2024-39498], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39504], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39508], [CVE-2024-39509], [CVE-2024-39510], [CVE-2024-40899], [CVE-2024-40900], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40903], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40906], [CVE-2024-40908], [CVE-2024-40909], [CVE-2024-40910], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40913], [CVE-2024-40914], [CVE-2024-40915], [CVE-2024-40916], [CVE-2024-40917], [CVE-2024-40918], [CVE-2024-40919], [CVE-2024-40920], [CVE-2024-40921], [CVE-2024-40922], [CVE-2024-40923], [CVE-2024-40924], [CVE-2024-40925], [CVE-2024-40926], [CVE-2024-40927], [CVE-2024-40928], [CVE-2024-40929], [CVE-2024-40930], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40933], [CVE-2024-40934], [CVE-2024-40935], [CVE-2024-40936], [CVE-2024-40937], [CVE-2024-40938], [CVE-2024-40939], [CVE-2024-40940], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40944], [CVE-2024-40945], [CVE-2024-40947], [CVE-2024-40948], [CVE-2024-40949], [CVE-2024-40951], [CVE-2024-40952], [CVE-2024-40953], [CVE-2024-40954], [CVE-2024-40955], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40962], [CVE-2024-40963], [CVE-2024-40964], [CVE-2024-40965], [CVE-2024-40966], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40969], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40972], [CVE-2024-40973], [CVE-2024-40974], [CVE-2024-40975], [CVE-2024-40976], [CVE-2024-40977], [CVE-2024-40978], [CVE-2024-40979], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40982], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40985], [CVE-2024-40986], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40989], [CVE-2024-40990], [CVE-2024-40992], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-40996], [CVE-2024-40997], [CVE-2024-40998], [CVE-2024-40999], [CVE-2024-41000], [CVE-2024-41001], [CVE-2024-41002], [CVE-2024-41003], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41040], [CVE-2024-42078], [CVE-2024-42148] |
USN-7008-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70073000000 |
false |
patch |
[USN-7007-3], [CVE-2022-48772], [CVE-2023-52884], [CVE-2023-52887], [CVE-2024-23848], [CVE-2024-25741], [CVE-2024-31076], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-35927], [CVE-2024-36014], [CVE-2024-36015], [CVE-2024-36032], [CVE-2024-36270], [CVE-2024-36286], [CVE-2024-36489], [CVE-2024-36894], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37078], [CVE-2024-37356], [CVE-2024-38381], [CVE-2024-38546], [CVE-2024-38547], [CVE-2024-38548], [CVE-2024-38549], [CVE-2024-38550], [CVE-2024-38552], [CVE-2024-38555], [CVE-2024-38558], [CVE-2024-38559], [CVE-2024-38560], [CVE-2024-38565], [CVE-2024-38567], [CVE-2024-38571], [CVE-2024-38573], [CVE-2024-38578], [CVE-2024-38579], [CVE-2024-38580], [CVE-2024-38582], [CVE-2024-38583], [CVE-2024-38586], [CVE-2024-38587], [CVE-2024-38588], [CVE-2024-38589], [CVE-2024-38590], [CVE-2024-38591], [CVE-2024-38596], [CVE-2024-38597], [CVE-2024-38598], [CVE-2024-38599], [CVE-2024-38601], [CVE-2024-38605], [CVE-2024-38607], [CVE-2024-38610], [CVE-2024-38612], [CVE-2024-38613], [CVE-2024-38615], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38627], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39301], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39471], [CVE-2024-39475], [CVE-2024-39480], [CVE-2024-39482], [CVE-2024-39487], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39493], [CVE-2024-39495], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39509], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40908], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40914], [CVE-2024-40916], [CVE-2024-40927], [CVE-2024-40929], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40934], [CVE-2024-40937], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40945], [CVE-2024-40954], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40963], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40974], [CVE-2024-40976], [CVE-2024-40978], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40990], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-41000], [CVE-2024-41002], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41007], [CVE-2024-41027], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41040], [CVE-2024-41041], [CVE-2024-41044], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41055], [CVE-2024-41087], [CVE-2024-41089], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41095], [CVE-2024-41097], [CVE-2024-42068], [CVE-2024-42070], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42109], [CVE-2024-42115], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42127], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42137], [CVE-2024-42140], [CVE-2024-42145], [CVE-2024-42148], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42154], [CVE-2024-42157], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42224], [CVE-2024-42225], [CVE-2024-42229], [CVE-2024-42232], [CVE-2024-42236], [CVE-2024-42240], [CVE-2024-42244], [CVE-2024-42247] |
USN-7007-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70071000000 |
false |
patch |
[USN-7007-1], [CVE-2022-48772], [CVE-2023-52884], [CVE-2023-52887], [CVE-2024-23848], [CVE-2024-25741], [CVE-2024-31076], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-35927], [CVE-2024-36014], [CVE-2024-36015], [CVE-2024-36032], [CVE-2024-36270], [CVE-2024-36286], [CVE-2024-36489], [CVE-2024-36894], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37078], [CVE-2024-37356], [CVE-2024-38381], [CVE-2024-38546], [CVE-2024-38547], [CVE-2024-38548], [CVE-2024-38549], [CVE-2024-38550], [CVE-2024-38552], [CVE-2024-38555], [CVE-2024-38558], [CVE-2024-38559], [CVE-2024-38560], [CVE-2024-38565], [CVE-2024-38567], [CVE-2024-38571], [CVE-2024-38573], [CVE-2024-38578], [CVE-2024-38579], [CVE-2024-38580], [CVE-2024-38582], [CVE-2024-38583], [CVE-2024-38586], [CVE-2024-38587], [CVE-2024-38588], [CVE-2024-38589], [CVE-2024-38590], [CVE-2024-38591], [CVE-2024-38596], [CVE-2024-38597], [CVE-2024-38598], [CVE-2024-38599], [CVE-2024-38601], [CVE-2024-38605], [CVE-2024-38607], [CVE-2024-38610], [CVE-2024-38612], [CVE-2024-38613], [CVE-2024-38615], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38627], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39301], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39471], [CVE-2024-39475], [CVE-2024-39480], [CVE-2024-39482], [CVE-2024-39487], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39493], [CVE-2024-39495], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39509], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40908], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40914], [CVE-2024-40916], [CVE-2024-40927], [CVE-2024-40929], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40934], [CVE-2024-40937], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40945], [CVE-2024-40954], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40963], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40974], [CVE-2024-40976], [CVE-2024-40978], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40990], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-41000], [CVE-2024-41002], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41007], [CVE-2024-41027], [CVE-2024-41034], [CVE-2024-41035], [CVE-2024-41040], [CVE-2024-41041], [CVE-2024-41044], [CVE-2024-41046], [CVE-2024-41047], [CVE-2024-41048], [CVE-2024-41049], [CVE-2024-41055], [CVE-2024-41087], [CVE-2024-41089], [CVE-2024-41092], [CVE-2024-41093], [CVE-2024-41095], [CVE-2024-41097], [CVE-2024-42068], [CVE-2024-42070], [CVE-2024-42076], [CVE-2024-42077], [CVE-2024-42080], [CVE-2024-42082], [CVE-2024-42084], [CVE-2024-42085], [CVE-2024-42086], [CVE-2024-42087], [CVE-2024-42089], [CVE-2024-42090], [CVE-2024-42092], [CVE-2024-42093], [CVE-2024-42094], [CVE-2024-42095], [CVE-2024-42096], [CVE-2024-42097], [CVE-2024-42098], [CVE-2024-42101], [CVE-2024-42102], [CVE-2024-42104], [CVE-2024-42105], [CVE-2024-42106], [CVE-2024-42109], [CVE-2024-42115], [CVE-2024-42119], [CVE-2024-42120], [CVE-2024-42121], [CVE-2024-42124], [CVE-2024-42127], [CVE-2024-42130], [CVE-2024-42131], [CVE-2024-42137], [CVE-2024-42140], [CVE-2024-42145], [CVE-2024-42148], [CVE-2024-42152], [CVE-2024-42153], [CVE-2024-42154], [CVE-2024-42157], [CVE-2024-42161], [CVE-2024-42223], [CVE-2024-42224], [CVE-2024-42225], [CVE-2024-42229], [CVE-2024-42232], [CVE-2024-42236], [CVE-2024-42240], [CVE-2024-42244], [CVE-2024-42247] |
USN-7007-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70052000000 |
false |
patch |
[USN-7005-2], [CVE-2022-48772], [CVE-2023-52884], [CVE-2024-23848], [CVE-2024-31076], [CVE-2024-32936], [CVE-2024-33619], [CVE-2024-33621], [CVE-2024-33847], [CVE-2024-34027], [CVE-2024-34030], [CVE-2024-34777], [CVE-2024-35247], [CVE-2024-36015], [CVE-2024-36244], [CVE-2024-36270], [CVE-2024-36281], [CVE-2024-36286], [CVE-2024-36288], [CVE-2024-36478], [CVE-2024-36479], [CVE-2024-36481], [CVE-2024-36484], [CVE-2024-36489], [CVE-2024-36971], [CVE-2024-36972], [CVE-2024-36973], [CVE-2024-36974], [CVE-2024-36978], [CVE-2024-37021], [CVE-2024-37026], [CVE-2024-37078], [CVE-2024-37354], [CVE-2024-37356], [CVE-2024-38306], [CVE-2024-38381], [CVE-2024-38384], [CVE-2024-38385], [CVE-2024-38388], [CVE-2024-38390], [CVE-2024-38618], [CVE-2024-38619], [CVE-2024-38621], [CVE-2024-38622], [CVE-2024-38623], [CVE-2024-38624], [CVE-2024-38625], [CVE-2024-38627], [CVE-2024-38628], [CVE-2024-38629], [CVE-2024-38630], [CVE-2024-38632], [CVE-2024-38633], [CVE-2024-38634], [CVE-2024-38635], [CVE-2024-38636], [CVE-2024-38637], [CVE-2024-38659], [CVE-2024-38661], [CVE-2024-38662], [CVE-2024-38663], [CVE-2024-38664], [CVE-2024-38667], [CVE-2024-38780], [CVE-2024-39276], [CVE-2024-39277], [CVE-2024-39291], [CVE-2024-39296], [CVE-2024-39298], [CVE-2024-39301], [CVE-2024-39371], [CVE-2024-39461], [CVE-2024-39462], [CVE-2024-39463], [CVE-2024-39464], [CVE-2024-39465], [CVE-2024-39466], [CVE-2024-39467], [CVE-2024-39468], [CVE-2024-39469], [CVE-2024-39470], [CVE-2024-39471], [CVE-2024-39473], [CVE-2024-39474], [CVE-2024-39475], [CVE-2024-39478], [CVE-2024-39479], [CVE-2024-39480], [CVE-2024-39481], [CVE-2024-39483], [CVE-2024-39485], [CVE-2024-39488], [CVE-2024-39489], [CVE-2024-39490], [CVE-2024-39491], [CVE-2024-39492], [CVE-2024-39493], [CVE-2024-39494], [CVE-2024-39495], [CVE-2024-39496], [CVE-2024-39497], [CVE-2024-39498], [CVE-2024-39499], [CVE-2024-39500], [CVE-2024-39501], [CVE-2024-39502], [CVE-2024-39503], [CVE-2024-39504], [CVE-2024-39505], [CVE-2024-39506], [CVE-2024-39507], [CVE-2024-39508], [CVE-2024-39509], [CVE-2024-39510], [CVE-2024-40899], [CVE-2024-40900], [CVE-2024-40901], [CVE-2024-40902], [CVE-2024-40903], [CVE-2024-40904], [CVE-2024-40905], [CVE-2024-40906], [CVE-2024-40908], [CVE-2024-40909], [CVE-2024-40910], [CVE-2024-40911], [CVE-2024-40912], [CVE-2024-40913], [CVE-2024-40914], [CVE-2024-40915], [CVE-2024-40916], [CVE-2024-40917], [CVE-2024-40918], [CVE-2024-40919], [CVE-2024-40920], [CVE-2024-40921], [CVE-2024-40922], [CVE-2024-40923], [CVE-2024-40924], [CVE-2024-40925], [CVE-2024-40926], [CVE-2024-40927], [CVE-2024-40928], [CVE-2024-40929], [CVE-2024-40930], [CVE-2024-40931], [CVE-2024-40932], [CVE-2024-40933], [CVE-2024-40934], [CVE-2024-40935], [CVE-2024-40936], [CVE-2024-40937], [CVE-2024-40938], [CVE-2024-40939], [CVE-2024-40940], [CVE-2024-40941], [CVE-2024-40942], [CVE-2024-40943], [CVE-2024-40944], [CVE-2024-40945], [CVE-2024-40947], [CVE-2024-40948], [CVE-2024-40949], [CVE-2024-40951], [CVE-2024-40952], [CVE-2024-40953], [CVE-2024-40954], [CVE-2024-40955], [CVE-2024-40956], [CVE-2024-40957], [CVE-2024-40958], [CVE-2024-40959], [CVE-2024-40960], [CVE-2024-40961], [CVE-2024-40962], [CVE-2024-40963], [CVE-2024-40964], [CVE-2024-40965], [CVE-2024-40966], [CVE-2024-40967], [CVE-2024-40968], [CVE-2024-40969], [CVE-2024-40970], [CVE-2024-40971], [CVE-2024-40972], [CVE-2024-40973], [CVE-2024-40974], [CVE-2024-40975], [CVE-2024-40976], [CVE-2024-40977], [CVE-2024-40978], [CVE-2024-40979], [CVE-2024-40980], [CVE-2024-40981], [CVE-2024-40982], [CVE-2024-40983], [CVE-2024-40984], [CVE-2024-40985], [CVE-2024-40986], [CVE-2024-40987], [CVE-2024-40988], [CVE-2024-40989], [CVE-2024-40990], [CVE-2024-40992], [CVE-2024-40994], [CVE-2024-40995], [CVE-2024-40996], [CVE-2024-40997], [CVE-2024-40998], [CVE-2024-40999], [CVE-2024-41000], [CVE-2024-41001], [CVE-2024-41002], [CVE-2024-41003], [CVE-2024-41004], [CVE-2024-41005], [CVE-2024-41006], [CVE-2024-41040], [CVE-2024-42078], [CVE-2024-42148] |
USN-7005-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:70021000000 |
false |
patch |
[USN-7002-1], [CVE-2024-6345] |
USN-7002-1 -- Setuptools vulnerability |
| oval:com.ubuntu.jammy:def:70011000000 |
false |
patch |
[USN-7001-1], [CVE-2024-45490], [CVE-2024-45491] |
USN-7001-1 -- xmltok library vulnerabilities |
| oval:com.ubuntu.jammy:def:70002000000 |
false |
patch |
[USN-7000-2], [CVE-2024-45490], [CVE-2024-45491], [CVE-2024-45492] |
USN-7000-2 -- Expat vulnerabilities |
| oval:com.ubuntu.jammy:def:69981000000 |
false |
patch |
[USN-6998-1], [CVE-2024-43167], [CVE-2024-43168] |
USN-6998-1 -- Unbound vulnerabilities |
| oval:com.ubuntu.jammy:def:69971000000 |
false |
patch |
[USN-6997-1], [CVE-2024-7006] |
USN-6997-1 -- LibTIFF vulnerability |
| oval:com.ubuntu.jammy:def:69961000000 |
false |
patch |
[USN-6996-1], [CVE-2024-40776], [CVE-2024-40779], [CVE-2024-40780], [CVE-2024-40782], [CVE-2024-40789], [CVE-2024-4558] |
USN-6996-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:69951000000 |
false |
patch |
[USN-6995-1], [CVE-2024-7519], [CVE-2024-7521], [CVE-2024-7522], [CVE-2024-7525], [CVE-2024-7526], [CVE-2024-7527], [CVE-2024-7529], [CVE-2024-8381], [CVE-2024-8382], [CVE-2024-8384] |
USN-6995-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:69941000000 |
false |
patch |
[USN-6994-1], [CVE-2023-34462], [CVE-2023-44487] |
USN-6994-1 -- Netty vulnerabilities |
| oval:com.ubuntu.jammy:def:69931000000 |
false |
patch |
[USN-6993-1], [CVE-2024-41957], [CVE-2024-43374] |
USN-6993-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:69911000000 |
false |
patch |
[USN-6991-1], [CVE-2024-23334] |
USN-6991-1 -- AIOHTTP vulnerability |
| oval:com.ubuntu.jammy:def:69901000000 |
false |
patch |
[USN-6990-1], [CVE-2024-39844] |
USN-6990-1 -- znc vulnerability |
| oval:com.ubuntu.jammy:def:69891000000 |
false |
patch |
[USN-6989-1], [CVE-2024-44082] |
USN-6989-1 -- OpenStack vulnerability |
| oval:com.ubuntu.jammy:def:69882000000 |
false |
patch |
[USN-6988-2], [CVE-2024-41671] |
USN-6988-2 -- Twisted vulnerability |
| oval:com.ubuntu.jammy:def:69881000000 |
false |
patch |
[USN-6988-1], [CVE-2024-41671], [CVE-2024-41810] |
USN-6988-1 -- Twisted vulnerabilities |
| oval:com.ubuntu.jammy:def:69871000000 |
false |
patch |
[USN-6987-1], [CVE-2024-45230], [CVE-2024-45231] |
USN-6987-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:69861000000 |
false |
patch |
[USN-6986-1], [CVE-2024-6119] |
USN-6986-1 -- OpenSSL vulnerability |
| oval:com.ubuntu.jammy:def:69841000000 |
false |
patch |
[USN-6984-1], [CVE-2024-42353] |
USN-6984-1 -- WebOb vulnerability |
| oval:com.ubuntu.jammy:def:69751000000 |
false |
patch |
[USN-6975-1], [CVE-2024-39292], [CVE-2024-39484] |
USN-6975-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69741000000 |
false |
patch |
[USN-6974-1], [CVE-2023-52629], [CVE-2023-52760], [CVE-2024-26680], [CVE-2024-26830], [CVE-2024-26921], [CVE-2024-36901], [CVE-2024-39292], [CVE-2024-39484] |
USN-6974-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69701000000 |
false |
patch |
[USN-6970-1], [CVE-2023-45897] |
USN-6970-1 -- exfatprogs vulnerability |
| oval:com.ubuntu.jammy:def:69691000000 |
false |
patch |
[USN-6969-1], [CVE-2024-25641], [CVE-2024-29894], [CVE-2024-31443], [CVE-2024-31444], [CVE-2024-31445], [CVE-2024-31458], [CVE-2024-31459], [CVE-2024-31460], [CVE-2024-34340] |
USN-6969-1 -- Cacti vulnerabilities |
| oval:com.ubuntu.jammy:def:69681000000 |
false |
patch |
[USN-6968-1], [CVE-2024-7348] |
USN-6968-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:69671000000 |
false |
patch |
[USN-6967-1], [CVE-2023-42667], [CVE-2023-49141], [CVE-2024-24853], [CVE-2024-24980], [CVE-2024-25939] |
USN-6967-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:69641000000 |
false |
patch |
[USN-6964-1], [CVE-2024-40897] |
USN-6964-1 -- ORC vulnerability |
| oval:com.ubuntu.jammy:def:69631000000 |
false |
patch |
[USN-6963-1], [CVE-2024-36472] |
USN-6963-1 -- GNOME Shell vulnerability |
| oval:com.ubuntu.jammy:def:69621000000 |
false |
patch |
[USN-6962-1], [CVE-2024-6472] |
USN-6962-1 -- LibreOffice vulnerability |
| oval:com.ubuntu.jammy:def:69611000000 |
false |
patch |
[USN-6961-1], [CVE-2022-48174], [CVE-2023-42363], [CVE-2023-42364], [CVE-2023-42365] |
USN-6961-1 -- BusyBox vulnerabilities |
| oval:com.ubuntu.jammy:def:69601000000 |
false |
patch |
[USN-6960-1], [CVE-2023-5349] |
USN-6960-1 -- RMagick vulnerability |
| oval:com.ubuntu.jammy:def:69591000000 |
false |
patch |
[USN-6959-1], [CVE-2024-38167] |
USN-6959-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:69561000000 |
false |
patch |
[USN-6956-1], [CVE-2023-52585], [CVE-2023-52752], [CVE-2023-52882], [CVE-2024-25742], [CVE-2024-26886], [CVE-2024-26900], [CVE-2024-26936], [CVE-2024-26952], [CVE-2024-26980], [CVE-2024-27017], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27401], [CVE-2024-35848], [CVE-2024-35947], [CVE-2024-36016], [CVE-2024-36017], [CVE-2024-36880], [CVE-2024-36883], [CVE-2024-36886], [CVE-2024-36889], [CVE-2024-36897], [CVE-2024-36902], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36916], [CVE-2024-36919], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36931], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36944], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36950], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36957], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36967], [CVE-2024-36969], [CVE-2024-36975], [CVE-2024-38600] |
USN-6956-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:69541000000 |
false |
patch |
[USN-6954-1], [CVE-2023-6683], [CVE-2023-6693], [CVE-2024-24474] |
USN-6954-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:69503000000 |
false |
patch |
[USN-6950-3], [CVE-2023-52585], [CVE-2023-52882], [CVE-2024-26900], [CVE-2024-26936], [CVE-2024-26980], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27401], [CVE-2024-35848], [CVE-2024-35947], [CVE-2024-36017], [CVE-2024-36031], [CVE-2024-36880], [CVE-2024-36883], [CVE-2024-36886], [CVE-2024-36889], [CVE-2024-36897], [CVE-2024-36902], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36916], [CVE-2024-36919], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36931], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36944], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36950], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36957], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36967], [CVE-2024-36969], [CVE-2024-36975], [CVE-2024-38600] |
USN-6950-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:69502000000 |
false |
patch |
[USN-6950-2], [CVE-2023-52585], [CVE-2023-52882], [CVE-2024-26900], [CVE-2024-26936], [CVE-2024-26980], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27401], [CVE-2024-35848], [CVE-2024-35947], [CVE-2024-36017], [CVE-2024-36031], [CVE-2024-36880], [CVE-2024-36883], [CVE-2024-36886], [CVE-2024-36889], [CVE-2024-36897], [CVE-2024-36902], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36916], [CVE-2024-36919], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36931], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36944], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36950], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36957], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36967], [CVE-2024-36969], [CVE-2024-36975], [CVE-2024-38600] |
USN-6950-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69501000000 |
false |
patch |
[USN-6950-1], [CVE-2023-52585], [CVE-2023-52882], [CVE-2024-26900], [CVE-2024-26936], [CVE-2024-26980], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27401], [CVE-2024-35848], [CVE-2024-35947], [CVE-2024-36017], [CVE-2024-36031], [CVE-2024-36880], [CVE-2024-36883], [CVE-2024-36886], [CVE-2024-36889], [CVE-2024-36897], [CVE-2024-36902], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36916], [CVE-2024-36919], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36931], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36944], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36950], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36957], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36967], [CVE-2024-36969], [CVE-2024-36975], [CVE-2024-38600] |
USN-6950-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69491000000 |
false |
patch |
[USN-6949-1], [CVE-2023-52882], [CVE-2024-27394], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27398], [CVE-2024-27399], [CVE-2024-27400], [CVE-2024-27401], [CVE-2024-35846], [CVE-2024-35847], [CVE-2024-35848], [CVE-2024-35849], [CVE-2024-35850], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35856], [CVE-2024-35857], [CVE-2024-35858], [CVE-2024-35859], [CVE-2024-35947], [CVE-2024-35949], [CVE-2024-35983], [CVE-2024-35986], [CVE-2024-35987], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35991], [CVE-2024-35993], [CVE-2024-35994], [CVE-2024-35996], [CVE-2024-35998], [CVE-2024-35999], [CVE-2024-36000], [CVE-2024-36001], [CVE-2024-36002], [CVE-2024-36003], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36009], [CVE-2024-36011], [CVE-2024-36012], [CVE-2024-36013], [CVE-2024-36014], [CVE-2024-36017], [CVE-2024-36028], [CVE-2024-36029], [CVE-2024-36030], [CVE-2024-36031], [CVE-2024-36032], [CVE-2024-36033], [CVE-2024-36880], [CVE-2024-36881], [CVE-2024-36882], [CVE-2024-36883], [CVE-2024-36884], [CVE-2024-36886], [CVE-2024-36887], [CVE-2024-36888], [CVE-2024-36889], [CVE-2024-36890], [CVE-2024-36891], [CVE-2024-36892], [CVE-2024-36893], [CVE-2024-36894], [CVE-2024-36895], [CVE-2024-36896], [CVE-2024-36897], [CVE-2024-36898], [CVE-2024-36899], [CVE-2024-36900], [CVE-2024-36901], [CVE-2024-36902], [CVE-2024-36903], [CVE-2024-36904], [CVE-2024-36905], [CVE-2024-36906], [CVE-2024-36908], [CVE-2024-36909], [CVE-2024-36910], [CVE-2024-36911], [CVE-2024-36912], [CVE-2024-36913], [CVE-2024-36914], [CVE-2024-36915], [CVE-2024-36916], [CVE-2024-36917], [CVE-2024-36918], [CVE-2024-36919], [CVE-2024-36920], [CVE-2024-36921], [CVE-2024-36922], [CVE-2024-36923], [CVE-2024-36924], [CVE-2024-36925], [CVE-2024-36926], [CVE-2024-36927], [CVE-2024-36928], [CVE-2024-36929], [CVE-2024-36930], [CVE-2024-36931], [CVE-2024-36932], [CVE-2024-36933], [CVE-2024-36934], [CVE-2024-36935], [CVE-2024-36936], [CVE-2024-36937], [CVE-2024-36938], [CVE-2024-36939], [CVE-2024-36940], [CVE-2024-36941], [CVE-2024-36943], [CVE-2024-36944], [CVE-2024-36945], [CVE-2024-36946], [CVE-2024-36947], [CVE-2024-36948], [CVE-2024-36949], [CVE-2024-36950], [CVE-2024-36951], [CVE-2024-36952], [CVE-2024-36953], [CVE-2024-36954], [CVE-2024-36955], [CVE-2024-36956], [CVE-2024-36957], [CVE-2024-36958], [CVE-2024-36959], [CVE-2024-36960], [CVE-2024-36961], [CVE-2024-36962], [CVE-2024-36963], [CVE-2024-36964], [CVE-2024-36965], [CVE-2024-36966], [CVE-2024-36967], [CVE-2024-36968], [CVE-2024-36969], [CVE-2024-36975], [CVE-2024-36977], [CVE-2024-36979], [CVE-2024-38538], [CVE-2024-38539], [CVE-2024-38540], [CVE-2024-38541], [CVE-2024-38542], [CVE-2024-38543], [CVE-2024-38544], [CVE-2024-38545], [CVE-2024-38546], [CVE-2024-38547], [CVE-2024-38548], [CVE-2024-38549], [CVE-2024-38550], [CVE-2024-38551], [CVE-2024-38552], [CVE-2024-38553], [CVE-2024-38554], [CVE-2024-38555], [CVE-2024-38556], [CVE-2024-38557], [CVE-2024-38558], [CVE-2024-38559], [CVE-2024-38560], [CVE-2024-38561], [CVE-2024-38562], [CVE-2024-38563], [CVE-2024-38564], [CVE-2024-38565], [CVE-2024-38566], [CVE-2024-38567], [CVE-2024-38568], [CVE-2024-38569], [CVE-2024-38570], [CVE-2024-38571], [CVE-2024-38572], [CVE-2024-38573], [CVE-2024-38574], [CVE-2024-38575], [CVE-2024-38576], [CVE-2024-38577], [CVE-2024-38578], [CVE-2024-38579], [CVE-2024-38580], [CVE-2024-38582], [CVE-2024-38583], [CVE-2024-38584], [CVE-2024-38585], [CVE-2024-38586], [CVE-2024-38587], [CVE-2024-38588], [CVE-2024-38589], [CVE-2024-38590], [CVE-2024-38591], [CVE-2024-38592], [CVE-2024-38593], [CVE-2024-38594], [CVE-2024-38595], [CVE-2024-38596], [CVE-2024-38597], [CVE-2024-38598], [CVE-2024-38599], [CVE-2024-38600], [CVE-2024-38601], [CVE-2024-38602], [CVE-2024-38603], [CVE-2024-38604], [CVE-2024-38605], [CVE-2024-38606], [CVE-2024-38607], [CVE-2024-38610], [CVE-2024-38611], [CVE-2024-38612], [CVE-2024-38613], [CVE-2024-38614], [CVE-2024-38615], [CVE-2024-38616], [CVE-2024-38617], [CVE-2024-38620], [CVE-2024-39482], [CVE-2024-41011], [CVE-2024-42134] |
USN-6949-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69471000000 |
false |
patch |
[USN-6947-1], [CVE-2024-37370], [CVE-2024-37371] |
USN-6947-1 -- Kerberos vulnerabilities |
| oval:com.ubuntu.jammy:def:69461000000 |
false |
patch |
[USN-6946-1], [CVE-2024-41989], [CVE-2024-41990], [CVE-2024-41991], [CVE-2024-42005] |
USN-6946-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:69451000000 |
false |
patch |
[USN-6945-1], [CVE-2024-5290] |
USN-6945-1 -- wpa_supplicant and hostapd vulnerability |
| oval:com.ubuntu.jammy:def:69441000000 |
false |
patch |
[USN-6944-1], [CVE-2024-7264] |
USN-6944-1 -- curl vulnerability |
| oval:com.ubuntu.jammy:def:69431000000 |
false |
patch |
[USN-6943-1], [CVE-2020-9484], [CVE-2021-25122], [CVE-2021-41079], [CVE-2022-23181], [CVE-2022-29885] |
USN-6943-1 -- Tomcat vulnerabilities |
| oval:com.ubuntu.jammy:def:69421000000 |
false |
patch |
[USN-6942-1], [CVE-2023-52159] |
USN-6942-1 -- Gross vulnerability |
| oval:com.ubuntu.jammy:def:69401000000 |
false |
patch |
[USN-6940-1], [CVE-2024-1724], [CVE-2024-29068], [CVE-2024-29069] |
USN-6940-1 -- snapd vulnerabilities |
| oval:com.ubuntu.jammy:def:69391000000 |
false |
patch |
[USN-6939-1], [CVE-2024-39929] |
USN-6939-1 -- Exim vulnerability |
| oval:com.ubuntu.jammy:def:69371000000 |
false |
patch |
[USN-6937-1], [CVE-2024-2511], [CVE-2024-4603], [CVE-2024-4741], [CVE-2024-5535] |
USN-6937-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:69351000000 |
false |
patch |
[USN-6935-1], [CVE-2023-40577] |
USN-6935-1 -- Prometheus Alertmanager vulnerability |
| oval:com.ubuntu.jammy:def:69341000000 |
false |
patch |
[USN-6934-1], [CVE-2024-20996], [CVE-2024-21125], [CVE-2024-21127], [CVE-2024-21129], [CVE-2024-21130], [CVE-2024-21134], [CVE-2024-21142], [CVE-2024-21162], [CVE-2024-21163], [CVE-2024-21165], [CVE-2024-21171], [CVE-2024-21173], [CVE-2024-21177], [CVE-2024-21179], [CVE-2024-21185] |
USN-6934-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:69321000000 |
false |
patch |
[USN-6932-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21145], [CVE-2024-21147] |
USN-6932-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:69311000000 |
false |
patch |
[USN-6931-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21145], [CVE-2024-21147] |
USN-6931-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:69301000000 |
false |
patch |
[USN-6930-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21144], [CVE-2024-21145], [CVE-2024-21147] |
USN-6930-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:69291000000 |
false |
patch |
[USN-6929-1], [CVE-2024-21131], [CVE-2024-21138], [CVE-2024-21140], [CVE-2024-21144], [CVE-2024-21145], [CVE-2024-21147] |
USN-6929-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:69281000000 |
false |
patch |
[USN-6928-1], [CVE-2024-0397], [CVE-2024-4032] |
USN-6928-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:69232000000 |
false |
patch |
[USN-6923-2], [CVE-2023-52752], [CVE-2024-25742], [CVE-2024-26886], [CVE-2024-26952], [CVE-2024-27017], [CVE-2024-36016] |
USN-6923-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69231000000 |
false |
patch |
[USN-6923-1], [CVE-2023-52752], [CVE-2024-25742], [CVE-2024-26886], [CVE-2024-26952], [CVE-2024-27017], [CVE-2024-36016] |
USN-6923-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69222000000 |
false |
patch |
[USN-6922-2], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-25739] |
USN-6922-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69221000000 |
false |
patch |
[USN-6922-1], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-25739] |
USN-6922-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69191000000 |
false |
patch |
[USN-6919-1], [CVE-2022-38096], [CVE-2022-48808], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52488], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-52699], [CVE-2023-52880], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-21823], [CVE-2024-22099], [CVE-2024-23307], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26643], [CVE-2024-26651], [CVE-2024-26654], [CVE-2024-26659], [CVE-2024-26687], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26816], [CVE-2024-26817], [CVE-2024-26820], [CVE-2024-26828], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26848], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26924], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27059], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-27437], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845], [CVE-2024-35847], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35918], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029] |
USN-6919-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69171000000 |
false |
patch |
[USN-6917-1], [CVE-2022-38096], [CVE-2022-48808], [CVE-2023-52488], [CVE-2023-52699], [CVE-2023-52880], [CVE-2024-23307], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26654], [CVE-2024-26687], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26817], [CVE-2024-26828], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27018], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27059], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27437], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35815], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35847], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35901], [CVE-2024-35902], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35918], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35927], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029], [CVE-2024-36031] |
USN-6917-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:69161000000 |
false |
patch |
[USN-6916-1], [CVE-2022-28805], [CVE-2022-33099] |
USN-6916-1 -- Lua vulnerabilities |
| oval:com.ubuntu.jammy:def:69151000000 |
false |
patch |
[USN-6915-1], [CVE-2024-6239] |
USN-6915-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:69141000000 |
false |
patch |
[USN-6914-1], [CVE-2022-39369] |
USN-6914-1 -- OCS Inventory vulnerability |
| oval:com.ubuntu.jammy:def:69131000000 |
false |
patch |
[USN-6913-1], [CVE-2022-39369] |
USN-6913-1 -- phpCAS vulnerability |
| oval:com.ubuntu.jammy:def:69111000000 |
false |
patch |
[USN-6911-1], [CVE-2024-40767] |
USN-6911-1 -- Nova vulnerability |
| oval:com.ubuntu.jammy:def:69101000000 |
false |
patch |
[USN-6910-1], [CVE-2015-7559], [CVE-2018-11775], [CVE-2020-13920], [CVE-2021-26117], [CVE-2022-41678], [CVE-2023-46604] |
USN-6910-1 -- Apache ActiveMQ vulnerabilities |
| oval:com.ubuntu.jammy:def:69091000000 |
false |
patch |
[USN-6909-1], [CVE-2024-0760], [CVE-2024-1737], [CVE-2024-1975], [CVE-2024-4076] |
USN-6909-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:69071000000 |
false |
patch |
[USN-6907-1], [CVE-2024-37894] |
USN-6907-1 -- Squid vulnerability |
| oval:com.ubuntu.jammy:def:69061000000 |
false |
patch |
[USN-6906-1], [CVE-2024-5569] |
USN-6906-1 -- python-zipp vulnerability |
| oval:com.ubuntu.jammy:def:69051000000 |
false |
patch |
[USN-6905-1], [CVE-2023-27530], [CVE-2023-27539] |
USN-6905-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:69041000000 |
false |
patch |
[USN-6904-1], [CVE-2024-5629] |
USN-6904-1 -- PyMongo vulnerability |
| oval:com.ubuntu.jammy:def:69031000000 |
false |
patch |
[USN-6903-1], [CVE-2024-6600], [CVE-2024-6601], [CVE-2024-6602], [CVE-2024-6603], [CVE-2024-6604] |
USN-6903-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:69021000000 |
false |
patch |
[USN-6902-1], [CVE-2024-40725] |
USN-6902-1 -- Apache HTTP Server vulnerability |
| oval:com.ubuntu.jammy:def:69001000000 |
false |
patch |
[USN-6900-1], [CVE-2023-52631], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2023-52645], [CVE-2023-52880], [CVE-2023-6270], [CVE-2024-0841], [CVE-2024-1151], [CVE-2024-23307], [CVE-2024-24861], [CVE-2024-26593], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26602], [CVE-2024-26603], [CVE-2024-26606], [CVE-2024-26642], [CVE-2024-26643], [CVE-2024-26659], [CVE-2024-26660], [CVE-2024-26661], [CVE-2024-26662], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26666], [CVE-2024-26667], [CVE-2024-26674], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26677], [CVE-2024-26679], [CVE-2024-26680], [CVE-2024-26681], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26688], [CVE-2024-26689], [CVE-2024-26691], [CVE-2024-26693], [CVE-2024-26694], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26700], [CVE-2024-26702], [CVE-2024-26703], [CVE-2024-26707], [CVE-2024-26708], [CVE-2024-26710], [CVE-2024-26711], [CVE-2024-26712], [CVE-2024-26714], [CVE-2024-26715], [CVE-2024-26716], [CVE-2024-26717], [CVE-2024-26718], [CVE-2024-26719], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26723], [CVE-2024-26726], [CVE-2024-26733], [CVE-2024-26734], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26748], [CVE-2024-26782], [CVE-2024-26789], [CVE-2024-26790], [CVE-2024-26792], [CVE-2024-26798], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26809], [CVE-2024-26818], [CVE-2024-26820], [CVE-2024-26822], [CVE-2024-26824], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26828], [CVE-2024-26829], [CVE-2024-26830], [CVE-2024-26831], [CVE-2024-26838], [CVE-2024-26889], [CVE-2024-26890], [CVE-2024-26898], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26917], [CVE-2024-26919], [CVE-2024-26920], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26924], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-27416], [CVE-2024-35833] |
USN-6900-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68991000000 |
false |
patch |
[USN-6899-1], [CVE-2024-6655] |
USN-6899-1 -- GTK vulnerability |
| oval:com.ubuntu.jammy:def:68983000000 |
false |
patch |
[USN-6898-3], [CVE-2022-38096], [CVE-2023-52488], [CVE-2023-52699], [CVE-2023-52880], [CVE-2024-23307], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26654], [CVE-2024-26687], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26817], [CVE-2024-26828], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27018], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27059], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27437], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35815], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35847], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35902], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35918], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029] |
USN-6898-3 -- Linux kernel kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68982000000 |
false |
patch |
[USN-6898-2], [CVE-2022-38096], [CVE-2023-52488], [CVE-2023-52699], [CVE-2023-52880], [CVE-2024-23307], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26654], [CVE-2024-26687], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26817], [CVE-2024-26828], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27018], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27059], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27437], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35815], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35847], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35902], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35918], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029] |
USN-6898-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68981000000 |
false |
patch |
[USN-6898-1], [CVE-2022-38096], [CVE-2023-52488], [CVE-2023-52699], [CVE-2023-52880], [CVE-2024-23307], [CVE-2024-24857], [CVE-2024-24858], [CVE-2024-24859], [CVE-2024-24861], [CVE-2024-25739], [CVE-2024-26629], [CVE-2024-26642], [CVE-2024-26654], [CVE-2024-26687], [CVE-2024-26810], [CVE-2024-26811], [CVE-2024-26812], [CVE-2024-26813], [CVE-2024-26814], [CVE-2024-26817], [CVE-2024-26828], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26925], [CVE-2024-26926], [CVE-2024-26929], [CVE-2024-26931], [CVE-2024-26934], [CVE-2024-26935], [CVE-2024-26937], [CVE-2024-26950], [CVE-2024-26951], [CVE-2024-26955], [CVE-2024-26956], [CVE-2024-26957], [CVE-2024-26958], [CVE-2024-26960], [CVE-2024-26961], [CVE-2024-26964], [CVE-2024-26965], [CVE-2024-26966], [CVE-2024-26969], [CVE-2024-26970], [CVE-2024-26973], [CVE-2024-26974], [CVE-2024-26976], [CVE-2024-26977], [CVE-2024-26981], [CVE-2024-26984], [CVE-2024-26988], [CVE-2024-26989], [CVE-2024-26993], [CVE-2024-26994], [CVE-2024-26996], [CVE-2024-26999], [CVE-2024-27000], [CVE-2024-27001], [CVE-2024-27004], [CVE-2024-27008], [CVE-2024-27009], [CVE-2024-27013], [CVE-2024-27015], [CVE-2024-27016], [CVE-2024-27018], [CVE-2024-27019], [CVE-2024-27020], [CVE-2024-27059], [CVE-2024-27393], [CVE-2024-27395], [CVE-2024-27396], [CVE-2024-27437], [CVE-2024-35785], [CVE-2024-35789], [CVE-2024-35791], [CVE-2024-35796], [CVE-2024-35804], [CVE-2024-35805], [CVE-2024-35806], [CVE-2024-35807], [CVE-2024-35809], [CVE-2024-35813], [CVE-2024-35815], [CVE-2024-35817], [CVE-2024-35819], [CVE-2024-35821], [CVE-2024-35822], [CVE-2024-35823], [CVE-2024-35825], [CVE-2024-35847], [CVE-2024-35849], [CVE-2024-35851], [CVE-2024-35852], [CVE-2024-35853], [CVE-2024-35854], [CVE-2024-35855], [CVE-2024-35857], [CVE-2024-35871], [CVE-2024-35872], [CVE-2024-35877], [CVE-2024-35879], [CVE-2024-35884], [CVE-2024-35885], [CVE-2024-35886], [CVE-2024-35888], [CVE-2024-35890], [CVE-2024-35893], [CVE-2024-35895], [CVE-2024-35896], [CVE-2024-35897], [CVE-2024-35898], [CVE-2024-35899], [CVE-2024-35900], [CVE-2024-35902], [CVE-2024-35905], [CVE-2024-35907], [CVE-2024-35910], [CVE-2024-35912], [CVE-2024-35915], [CVE-2024-35918], [CVE-2024-35922], [CVE-2024-35925], [CVE-2024-35930], [CVE-2024-35933], [CVE-2024-35934], [CVE-2024-35935], [CVE-2024-35936], [CVE-2024-35938], [CVE-2024-35940], [CVE-2024-35944], [CVE-2024-35950], [CVE-2024-35955], [CVE-2024-35958], [CVE-2024-35960], [CVE-2024-35969], [CVE-2024-35970], [CVE-2024-35973], [CVE-2024-35976], [CVE-2024-35978], [CVE-2024-35982], [CVE-2024-35984], [CVE-2024-35988], [CVE-2024-35989], [CVE-2024-35990], [CVE-2024-35997], [CVE-2024-36004], [CVE-2024-36005], [CVE-2024-36006], [CVE-2024-36007], [CVE-2024-36008], [CVE-2024-36020], [CVE-2024-36025], [CVE-2024-36029] |
USN-6898-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68971000000 |
false |
patch |
[USN-6897-1], [CVE-2024-29506], [CVE-2024-29507], [CVE-2024-29508], [CVE-2024-29509], [CVE-2024-29511] |
USN-6897-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:68954000000 |
false |
patch |
[USN-6895-4], [CVE-2023-52631], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2023-52645], [CVE-2023-52880], [CVE-2023-6270], [CVE-2024-0841], [CVE-2024-1151], [CVE-2024-23307], [CVE-2024-24861], [CVE-2024-26593], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26602], [CVE-2024-26603], [CVE-2024-26606], [CVE-2024-26642], [CVE-2024-26659], [CVE-2024-26660], [CVE-2024-26661], [CVE-2024-26662], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26666], [CVE-2024-26667], [CVE-2024-26674], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26677], [CVE-2024-26679], [CVE-2024-26680], [CVE-2024-26681], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26688], [CVE-2024-26689], [CVE-2024-26691], [CVE-2024-26693], [CVE-2024-26694], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26700], [CVE-2024-26702], [CVE-2024-26703], [CVE-2024-26707], [CVE-2024-26708], [CVE-2024-26710], [CVE-2024-26711], [CVE-2024-26712], [CVE-2024-26714], [CVE-2024-26715], [CVE-2024-26716], [CVE-2024-26717], [CVE-2024-26718], [CVE-2024-26719], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26723], [CVE-2024-26726], [CVE-2024-26733], [CVE-2024-26734], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26748], [CVE-2024-26782], [CVE-2024-26789], [CVE-2024-26790], [CVE-2024-26792], [CVE-2024-26798], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26818], [CVE-2024-26820], [CVE-2024-26822], [CVE-2024-26824], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26828], [CVE-2024-26829], [CVE-2024-26830], [CVE-2024-26831], [CVE-2024-26838], [CVE-2024-26889], [CVE-2024-26890], [CVE-2024-26898], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26917], [CVE-2024-26919], [CVE-2024-26920], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26926], [CVE-2024-27416], [CVE-2024-35833] |
USN-6895-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68953000000 |
false |
patch |
[USN-6895-3], [CVE-2023-52631], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2023-52645], [CVE-2023-52880], [CVE-2023-6270], [CVE-2024-0841], [CVE-2024-1151], [CVE-2024-23307], [CVE-2024-24861], [CVE-2024-26593], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26602], [CVE-2024-26603], [CVE-2024-26606], [CVE-2024-26642], [CVE-2024-26659], [CVE-2024-26660], [CVE-2024-26661], [CVE-2024-26662], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26666], [CVE-2024-26667], [CVE-2024-26674], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26677], [CVE-2024-26679], [CVE-2024-26680], [CVE-2024-26681], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26688], [CVE-2024-26689], [CVE-2024-26691], [CVE-2024-26693], [CVE-2024-26694], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26700], [CVE-2024-26702], [CVE-2024-26703], [CVE-2024-26707], [CVE-2024-26708], [CVE-2024-26710], [CVE-2024-26711], [CVE-2024-26712], [CVE-2024-26714], [CVE-2024-26715], [CVE-2024-26716], [CVE-2024-26717], [CVE-2024-26718], [CVE-2024-26719], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26723], [CVE-2024-26726], [CVE-2024-26733], [CVE-2024-26734], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26748], [CVE-2024-26782], [CVE-2024-26789], [CVE-2024-26790], [CVE-2024-26792], [CVE-2024-26798], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26818], [CVE-2024-26820], [CVE-2024-26822], [CVE-2024-26824], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26828], [CVE-2024-26829], [CVE-2024-26830], [CVE-2024-26831], [CVE-2024-26838], [CVE-2024-26889], [CVE-2024-26890], [CVE-2024-26898], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26917], [CVE-2024-26919], [CVE-2024-26920], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26926], [CVE-2024-27416], [CVE-2024-35833] |
USN-6895-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68952000000 |
false |
patch |
[USN-6895-2], [CVE-2023-52631], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2023-52645], [CVE-2023-52880], [CVE-2023-6270], [CVE-2024-0841], [CVE-2024-1151], [CVE-2024-23307], [CVE-2024-24861], [CVE-2024-26593], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26602], [CVE-2024-26603], [CVE-2024-26606], [CVE-2024-26642], [CVE-2024-26659], [CVE-2024-26660], [CVE-2024-26661], [CVE-2024-26662], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26666], [CVE-2024-26667], [CVE-2024-26674], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26677], [CVE-2024-26679], [CVE-2024-26680], [CVE-2024-26681], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26688], [CVE-2024-26689], [CVE-2024-26691], [CVE-2024-26693], [CVE-2024-26694], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26700], [CVE-2024-26702], [CVE-2024-26703], [CVE-2024-26707], [CVE-2024-26708], [CVE-2024-26710], [CVE-2024-26711], [CVE-2024-26712], [CVE-2024-26714], [CVE-2024-26715], [CVE-2024-26716], [CVE-2024-26717], [CVE-2024-26718], [CVE-2024-26719], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26723], [CVE-2024-26726], [CVE-2024-26733], [CVE-2024-26734], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26748], [CVE-2024-26782], [CVE-2024-26789], [CVE-2024-26790], [CVE-2024-26792], [CVE-2024-26798], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26818], [CVE-2024-26820], [CVE-2024-26822], [CVE-2024-26824], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26828], [CVE-2024-26829], [CVE-2024-26830], [CVE-2024-26831], [CVE-2024-26838], [CVE-2024-26889], [CVE-2024-26890], [CVE-2024-26898], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26917], [CVE-2024-26919], [CVE-2024-26920], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26926], [CVE-2024-27416], [CVE-2024-35833] |
USN-6895-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68951000000 |
false |
patch |
[USN-6895-1], [CVE-2023-52631], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2023-52645], [CVE-2023-52880], [CVE-2023-6270], [CVE-2024-0841], [CVE-2024-1151], [CVE-2024-23307], [CVE-2024-24861], [CVE-2024-26593], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26602], [CVE-2024-26603], [CVE-2024-26606], [CVE-2024-26642], [CVE-2024-26659], [CVE-2024-26660], [CVE-2024-26661], [CVE-2024-26662], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26666], [CVE-2024-26667], [CVE-2024-26674], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26677], [CVE-2024-26679], [CVE-2024-26680], [CVE-2024-26681], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26688], [CVE-2024-26689], [CVE-2024-26691], [CVE-2024-26693], [CVE-2024-26694], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26700], [CVE-2024-26702], [CVE-2024-26703], [CVE-2024-26707], [CVE-2024-26708], [CVE-2024-26710], [CVE-2024-26711], [CVE-2024-26712], [CVE-2024-26714], [CVE-2024-26715], [CVE-2024-26716], [CVE-2024-26717], [CVE-2024-26718], [CVE-2024-26719], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26723], [CVE-2024-26726], [CVE-2024-26733], [CVE-2024-26734], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26748], [CVE-2024-26782], [CVE-2024-26789], [CVE-2024-26790], [CVE-2024-26792], [CVE-2024-26798], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26818], [CVE-2024-26820], [CVE-2024-26822], [CVE-2024-26824], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26828], [CVE-2024-26829], [CVE-2024-26830], [CVE-2024-26831], [CVE-2024-26838], [CVE-2024-26889], [CVE-2024-26890], [CVE-2024-26898], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26917], [CVE-2024-26919], [CVE-2024-26920], [CVE-2024-26922], [CVE-2024-26923], [CVE-2024-26926], [CVE-2024-27416], [CVE-2024-35833] |
USN-6895-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68911000000 |
false |
patch |
[USN-6891-1], [CVE-2015-20107], [CVE-2018-1060], [CVE-2018-1061], [CVE-2018-14647], [CVE-2018-20406], [CVE-2018-20852], [CVE-2019-10160], [CVE-2019-16056], [CVE-2019-16935], [CVE-2019-17514], [CVE-2019-18348], [CVE-2019-20907], [CVE-2019-5010], [CVE-2019-9636], [CVE-2019-9674], [CVE-2019-9740], [CVE-2019-9947], [CVE-2019-9948], [CVE-2020-14422], [CVE-2020-26116], [CVE-2020-27619], [CVE-2020-8492], [CVE-2021-29921], [CVE-2021-3177], [CVE-2021-3426], [CVE-2021-3733], [CVE-2021-3737], [CVE-2021-4189], [CVE-2022-0391], [CVE-2022-42919], [CVE-2022-45061], [CVE-2022-48560], [CVE-2022-48564], [CVE-2022-48565], [CVE-2022-48566], [CVE-2023-24329], [CVE-2023-40217], [CVE-2023-41105], [CVE-2023-6507], [CVE-2023-6597], [CVE-2024-0450] |
USN-6891-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:68891000000 |
false |
patch |
[USN-6889-1], [CVE-2024-30105], [CVE-2024-35264], [CVE-2024-38095] |
USN-6889-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:68881000000 |
false |
patch |
[USN-6888-1], [CVE-2024-38875], [CVE-2024-39329], [CVE-2024-39330], [CVE-2024-39614] |
USN-6888-1 -- Django vulnerabilities |
| oval:com.ubuntu.jammy:def:68861000000 |
false |
patch |
[USN-6886-1], [CVE-2023-45288], [CVE-2023-45289], [CVE-2023-45290], [CVE-2024-24783], [CVE-2024-24784], [CVE-2024-24785], [CVE-2024-24788], [CVE-2024-24789], [CVE-2024-24790] |
USN-6886-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:68856000000 |
false |
patch |
[USN-6885-6] |
USN-6885-6 -- Apache HTTP Server regression |
| oval:com.ubuntu.jammy:def:68854000000 |
false |
patch |
[USN-6885-4] |
USN-6885-4 -- Apache HTTP Server regression |
| oval:com.ubuntu.jammy:def:68852000000 |
false |
patch |
[USN-6885-2] |
USN-6885-2 -- Apache HTTP Server regression |
| oval:com.ubuntu.jammy:def:68851000000 |
false |
patch |
[USN-6885-1], [CVE-2024-36387], [CVE-2024-38473], [CVE-2024-38474], [CVE-2024-38475], [CVE-2024-38476], [CVE-2024-38477], [CVE-2024-39573], [CVE-2024-39884] |
USN-6885-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:68841000000 |
false |
patch |
[USN-6884-1], [CVE-2024-32498] |
USN-6884-1 -- Nova vulnerability |
| oval:com.ubuntu.jammy:def:68831000000 |
false |
patch |
[USN-6883-1], [CVE-2024-32498] |
USN-6883-1 -- OpenStack Glance vulnerability |
| oval:com.ubuntu.jammy:def:68822000000 |
false |
patch |
[USN-6882-2], [CVE-2022-47951], [CVE-2024-32498] |
USN-6882-2 -- Cinder regression |
| oval:com.ubuntu.jammy:def:68821000000 |
false |
patch |
[USN-6882-1], [CVE-2024-32498] |
USN-6882-1 -- Cinder vulnerability |
| oval:com.ubuntu.jammy:def:68801000000 |
false |
patch |
[USN-6880-1], [CVE-2022-42252] |
USN-6880-1 -- Tomcat vulnerability |
| oval:com.ubuntu.jammy:def:68791000000 |
false |
patch |
[USN-6879-1], [CVE-2023-31620], [CVE-2023-31622], [CVE-2023-31624], [CVE-2023-31626], [CVE-2023-31627], [CVE-2023-31629], [CVE-2023-31630], [CVE-2023-31631], [CVE-2023-48945], [CVE-2023-48946], [CVE-2023-48947], [CVE-2023-48950], [CVE-2023-48951] |
USN-6879-1 -- Virtuoso Open-Source Edition vulnerabilities |
| oval:com.ubuntu.jammy:def:68761000000 |
false |
patch |
[USN-6876-1], [CVE-2019-19907], [CVE-2022-26562] |
USN-6876-1 -- Kopano Core vulnerabilities |
| oval:com.ubuntu.jammy:def:68741000000 |
false |
patch |
[USN-6874-1], [CVE-2024-21823], [CVE-2024-26643], [CVE-2024-26809], [CVE-2024-26924], [CVE-2024-26925], [CVE-2024-35901] |
USN-6874-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:68732000000 |
false |
patch |
[USN-6873-2], [CVE-2024-21823], [CVE-2024-26643], [CVE-2024-26809], [CVE-2024-26924], [CVE-2024-26925] |
USN-6873-2 -- Linux kernel (StarFive) vulnerabilities |
| oval:com.ubuntu.jammy:def:68731000000 |
false |
patch |
[USN-6873-1], [CVE-2024-21823], [CVE-2024-26643], [CVE-2024-26809], [CVE-2024-26924], [CVE-2024-26925] |
USN-6873-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68722000000 |
false |
patch |
[USN-6872-2], [CVE-2024-26643], [CVE-2024-26809], [CVE-2024-26924], [CVE-2024-26925] |
USN-6872-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68721000000 |
false |
patch |
[USN-6872-1], [CVE-2024-26643], [CVE-2024-26809], [CVE-2024-26924], [CVE-2024-26925] |
USN-6872-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68701000000 |
false |
patch |
[USN-6870-1], [CVE-2024-21823], [CVE-2024-26643], [CVE-2024-26924] |
USN-6870-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68691000000 |
false |
patch |
[USN-6869-1], [CVE-2024-26643], [CVE-2024-26924] |
USN-6869-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68601000000 |
false |
patch |
[USN-6860-1], [CVE-2024-28882], [CVE-2024-5594] |
USN-6860-1 -- OpenVPN vulnerabilities |
| oval:com.ubuntu.jammy:def:68591000000 |
false |
patch |
[USN-6859-1], [CVE-2024-6387] |
USN-6859-1 -- OpenSSH vulnerability |
| oval:com.ubuntu.jammy:def:68581000000 |
false |
patch |
[USN-6858-1], [CVE-2023-49990], [CVE-2023-49991], [CVE-2023-49992], [CVE-2023-49993], [CVE-2023-49994] |
USN-6858-1 -- eSpeak NG vulnerabilities |
| oval:com.ubuntu.jammy:def:68561000000 |
false |
patch |
[USN-6856-1], [CVE-2024-25081], [CVE-2024-25082] |
USN-6856-1 -- FontForge vulnerabilities |
| oval:com.ubuntu.jammy:def:68551000000 |
false |
patch |
[USN-6855-1], [CVE-2024-36600] |
USN-6855-1 -- libcdio vulnerability |
| oval:com.ubuntu.jammy:def:68541000000 |
false |
patch |
[USN-6854-1], [CVE-2022-40735] |
USN-6854-1 -- OpenSSL vulnerability |
| oval:com.ubuntu.jammy:def:68531000000 |
false |
patch |
[USN-6853-1], [CVE-2024-27280] |
USN-6853-1 -- Ruby vulnerability |
| oval:com.ubuntu.jammy:def:68521000000 |
false |
patch |
[USN-6852-1], [CVE-2024-38428] |
USN-6852-1 -- Wget vulnerability |
| oval:com.ubuntu.jammy:def:68512000000 |
false |
patch |
[USN-6851-2] |
USN-6851-2 -- Netplan regression |
| oval:com.ubuntu.jammy:def:68511000000 |
false |
patch |
[USN-6851-1], [CVE-2022-4968] |
USN-6851-1 -- Netplan vulnerabilities |
| oval:com.ubuntu.jammy:def:68481000000 |
false |
patch |
[USN-6848-1], [CVE-2023-47272], [CVE-2023-5631], [CVE-2024-37383], [CVE-2024-37384] |
USN-6848-1 -- Roundcube vulnerabilities |
| oval:com.ubuntu.jammy:def:68471000000 |
false |
patch |
[USN-6847-1], [CVE-2019-11471], [CVE-2020-23109], [CVE-2023-0996], [CVE-2023-29659], [CVE-2023-49460], [CVE-2023-49462], [CVE-2023-49463], [CVE-2023-49464] |
USN-6847-1 -- libheif vulnerabilities |
| oval:com.ubuntu.jammy:def:68461000000 |
false |
patch |
[USN-6846-1], [CVE-2022-3697], [CVE-2023-5764] |
USN-6846-1 -- Ansible vulnerabilities |
| oval:com.ubuntu.jammy:def:68442000000 |
false |
patch |
[USN-6844-2] |
USN-6844-2 -- CUPS regression |
| oval:com.ubuntu.jammy:def:68441000000 |
false |
patch |
[USN-6844-1], [CVE-2024-35235] |
USN-6844-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:68431000000 |
false |
patch |
[USN-6843-1], [CVE-2024-36041] |
USN-6843-1 -- Plasma Workspace vulnerability |
| oval:com.ubuntu.jammy:def:68421000000 |
false |
patch |
[USN-6842-1], [CVE-2022-4285], [CVE-2023-1972], [CVE-2023-39128], [CVE-2023-39129], [CVE-2023-39130] |
USN-6842-1 -- gdb vulnerabilities |
| oval:com.ubuntu.jammy:def:68411000000 |
false |
patch |
[USN-6841-1], [CVE-2024-5458] |
USN-6841-1 -- PHP vulnerability |
| oval:com.ubuntu.jammy:def:68401000000 |
false |
patch |
[USN-6840-1], [CVE-2024-5702], [CVE-2024-5688], [CVE-2024-5690], [CVE-2024-5691], [CVE-2024-5693], [CVE-2024-5696], [CVE-2024-5700] |
USN-6840-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:68391000000 |
false |
patch |
[USN-6839-1], [CVE-2024-21096] |
USN-6839-1 -- MariaDB vulnerability |
| oval:com.ubuntu.jammy:def:68381000000 |
false |
patch |
[USN-6838-1], [CVE-2024-27281], [CVE-2024-27282] |
USN-6838-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:68372000000 |
false |
patch |
[USN-6837-2], [CVE-2024-25126], [CVE-2024-26141], [CVE-2024-26146] |
USN-6837-2 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:68361000000 |
false |
patch |
[USN-6836-1], [CVE-2023-3758] |
USN-6836-1 -- SSSD vulnerability |
| oval:com.ubuntu.jammy:def:68351000000 |
false |
patch |
[USN-6835-1], [CVE-2023-52722], [CVE-2024-29510], [CVE-2024-33869], [CVE-2024-33870], [CVE-2024-33871] |
USN-6835-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:68331000000 |
false |
patch |
[USN-6833-1], [CVE-2024-37535] |
USN-6833-1 -- VTE vulnerability |
| oval:com.ubuntu.jammy:def:68321000000 |
false |
patch |
[USN-6832-1], [CVE-2023-31607], [CVE-2023-31608], [CVE-2023-31609], [CVE-2023-31610], [CVE-2023-31611], [CVE-2023-31612], [CVE-2023-31613], [CVE-2023-31614], [CVE-2023-31615], [CVE-2023-31616], [CVE-2023-31617], [CVE-2023-31618], [CVE-2023-31619], [CVE-2023-31623], [CVE-2023-31625], [CVE-2023-31628] |
USN-6832-1 -- Virtuoso Open-Source Edition vulnerabilities |
| oval:com.ubuntu.jammy:def:68301000000 |
false |
patch |
[USN-6830-1], [CVE-2024-5564] |
USN-6830-1 -- libndp vulnerability |
| oval:com.ubuntu.jammy:def:68291000000 |
false |
patch |
[USN-6829-1], [CVE-2022-1515] |
USN-6829-1 -- matio vulnerability |
| oval:com.ubuntu.jammy:def:68271000000 |
false |
patch |
[USN-6827-1], [CVE-2023-3164] |
USN-6827-1 -- LibTIFF vulnerability |
| oval:com.ubuntu.jammy:def:68261000000 |
false |
patch |
[USN-6826-1], [CVE-2023-41081] |
USN-6826-1 -- mod_jk vulnerability |
| oval:com.ubuntu.jammy:def:68251000000 |
false |
patch |
[USN-6825-1], [CVE-2016-4855], [CVE-2016-7405], [CVE-2021-3850] |
USN-6825-1 -- ADOdb vulnerabilities |
| oval:com.ubuntu.jammy:def:68241000000 |
false |
patch |
[USN-6824-1], [CVE-2021-40633], [CVE-2022-28506], [CVE-2023-39742] |
USN-6824-1 -- GIFLIB vulnerabilities |
| oval:com.ubuntu.jammy:def:68231000000 |
false |
patch |
[USN-6823-1], [CVE-2024-20994], [CVE-2024-20998], [CVE-2024-21000], [CVE-2024-21008], [CVE-2024-21009], [CVE-2024-21013], [CVE-2024-21047], [CVE-2024-21054], [CVE-2024-21060], [CVE-2024-21062], [CVE-2024-21069], [CVE-2024-21087], [CVE-2024-21096], [CVE-2024-21102] |
USN-6823-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:68221000000 |
false |
patch |
[USN-6822-1], [CVE-2023-32002], [CVE-2023-32006], [CVE-2023-32559] |
USN-6822-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:68214000000 |
false |
patch |
[USN-6821-4], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6821-4 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:68213000000 |
false |
patch |
[USN-6821-3], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6821-3 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:68212000000 |
false |
patch |
[USN-6821-2], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6821-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68211000000 |
false |
patch |
[USN-6821-1], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6821-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68202000000 |
false |
patch |
[USN-6820-2], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-21823], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6820-2 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:68201000000 |
false |
patch |
[USN-6820-1], [CVE-2023-52434], [CVE-2023-52447], [CVE-2023-52497], [CVE-2023-52620], [CVE-2023-52640], [CVE-2023-52641], [CVE-2023-52644], [CVE-2023-52645], [CVE-2023-52650], [CVE-2023-52652], [CVE-2023-52656], [CVE-2023-52662], [CVE-2023-6270], [CVE-2023-7042], [CVE-2024-0841], [CVE-2024-21823], [CVE-2024-22099], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26601], [CVE-2024-26603], [CVE-2024-26651], [CVE-2024-26659], [CVE-2024-26688], [CVE-2024-26733], [CVE-2024-26735], [CVE-2024-26736], [CVE-2024-26737], [CVE-2024-26743], [CVE-2024-26744], [CVE-2024-26747], [CVE-2024-26748], [CVE-2024-26749], [CVE-2024-26750], [CVE-2024-26751], [CVE-2024-26752], [CVE-2024-26754], [CVE-2024-26763], [CVE-2024-26764], [CVE-2024-26766], [CVE-2024-26769], [CVE-2024-26771], [CVE-2024-26772], [CVE-2024-26773], [CVE-2024-26774], [CVE-2024-26776], [CVE-2024-26777], [CVE-2024-26778], [CVE-2024-26779], [CVE-2024-26782], [CVE-2024-26787], [CVE-2024-26788], [CVE-2024-26790], [CVE-2024-26791], [CVE-2024-26792], [CVE-2024-26793], [CVE-2024-26795], [CVE-2024-26798], [CVE-2024-26801], [CVE-2024-26802], [CVE-2024-26803], [CVE-2024-26804], [CVE-2024-26805], [CVE-2024-26809], [CVE-2024-26816], [CVE-2024-26820], [CVE-2024-26833], [CVE-2024-26835], [CVE-2024-26838], [CVE-2024-26839], [CVE-2024-26840], [CVE-2024-26843], [CVE-2024-26845], [CVE-2024-26846], [CVE-2024-26851], [CVE-2024-26852], [CVE-2024-26855], [CVE-2024-26856], [CVE-2024-26857], [CVE-2024-26859], [CVE-2024-26861], [CVE-2024-26862], [CVE-2024-26863], [CVE-2024-26870], [CVE-2024-26872], [CVE-2024-26874], [CVE-2024-26875], [CVE-2024-26877], [CVE-2024-26878], [CVE-2024-26879], [CVE-2024-26880], [CVE-2024-26881], [CVE-2024-26882], [CVE-2024-26883], [CVE-2024-26884], [CVE-2024-26885], [CVE-2024-26889], [CVE-2024-26891], [CVE-2024-26894], [CVE-2024-26895], [CVE-2024-26897], [CVE-2024-26898], [CVE-2024-26901], [CVE-2024-26903], [CVE-2024-26906], [CVE-2024-26907], [CVE-2024-26915], [CVE-2024-27024], [CVE-2024-27028], [CVE-2024-27030], [CVE-2024-27034], [CVE-2024-27037], [CVE-2024-27038], [CVE-2024-27039], [CVE-2024-27043], [CVE-2024-27044], [CVE-2024-27045], [CVE-2024-27046], [CVE-2024-27047], [CVE-2024-27051], [CVE-2024-27052], [CVE-2024-27053], [CVE-2024-27054], [CVE-2024-27065], [CVE-2024-27073], [CVE-2024-27074], [CVE-2024-27075], [CVE-2024-27076], [CVE-2024-27077], [CVE-2024-27078], [CVE-2024-27388], [CVE-2024-27390], [CVE-2024-27403], [CVE-2024-27405], [CVE-2024-27410], [CVE-2024-27412], [CVE-2024-27413], [CVE-2024-27414], [CVE-2024-27415], [CVE-2024-27416], [CVE-2024-27417], [CVE-2024-27419], [CVE-2024-27431], [CVE-2024-27432], [CVE-2024-27436], [CVE-2024-35811], [CVE-2024-35828], [CVE-2024-35829], [CVE-2024-35830], [CVE-2024-35844], [CVE-2024-35845] |
USN-6820-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68194000000 |
false |
patch |
[USN-6819-4], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6819-4 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:68193000000 |
false |
patch |
[USN-6819-3], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6819-3 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:68191000000 |
false |
patch |
[USN-6819-1], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6819-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68184000000 |
false |
patch |
[USN-6818-4], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-21823], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6818-4 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:68183000000 |
false |
patch |
[USN-6818-3], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-21823], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6818-3 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:68181000000 |
false |
patch |
[USN-6818-1], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52446], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52450], [CVE-2023-52451], [CVE-2023-52452], [CVE-2023-52453], [CVE-2023-52454], [CVE-2023-52455], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52465], [CVE-2023-52467], [CVE-2023-52468], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52472], [CVE-2023-52473], [CVE-2023-52486], [CVE-2023-52487], [CVE-2023-52488], [CVE-2023-52489], [CVE-2023-52490], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52495], [CVE-2023-52497], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52591], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52611], [CVE-2023-52612], [CVE-2023-52614], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52621], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52626], [CVE-2023-52627], [CVE-2023-52632], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52664], [CVE-2023-52666], [CVE-2023-52667], [CVE-2023-52669], [CVE-2023-52670], [CVE-2023-52672], [CVE-2023-52674], [CVE-2023-52675], [CVE-2023-52676], [CVE-2023-52677], [CVE-2023-52678], [CVE-2023-52679], [CVE-2023-52680], [CVE-2023-52681], [CVE-2023-52682], [CVE-2023-52683], [CVE-2023-52685], [CVE-2023-52686], [CVE-2023-52687], [CVE-2023-52690], [CVE-2023-52691], [CVE-2023-52692], [CVE-2023-52693], [CVE-2023-52694], [CVE-2023-52696], [CVE-2023-52697], [CVE-2023-52698], [CVE-2023-6356], [CVE-2023-6535], [CVE-2023-6536], [CVE-2024-21823], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26582], [CVE-2024-26583], [CVE-2024-26584], [CVE-2024-26585], [CVE-2024-26586], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26595], [CVE-2024-26598], [CVE-2024-26607], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26612], [CVE-2024-26615], [CVE-2024-26616], [CVE-2024-26618], [CVE-2024-26620], [CVE-2024-26623], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26629], [CVE-2024-26631], [CVE-2024-26632], [CVE-2024-26633], [CVE-2024-26634], [CVE-2024-26636], [CVE-2024-26638], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26646], [CVE-2024-26647], [CVE-2024-26649], [CVE-2024-26668], [CVE-2024-26669], [CVE-2024-26670], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26808], [CVE-2024-35835], [CVE-2024-35837], [CVE-2024-35838], [CVE-2024-35839], [CVE-2024-35840], [CVE-2024-35841], [CVE-2024-35842] |
USN-6818-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:68141000000 |
false |
patch |
[USN-6814-1], [CVE-2024-5197] |
USN-6814-1 -- libvpx vulnerability |
| oval:com.ubuntu.jammy:def:68131000000 |
false |
patch |
[USN-6813-1], [CVE-2024-21011], [CVE-2024-21012], [CVE-2024-21068], [CVE-2024-21094] |
USN-6813-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:68121000000 |
false |
patch |
[USN-6812-1], [CVE-2024-21011], [CVE-2024-21012], [CVE-2024-21068], [CVE-2024-21094] |
USN-6812-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:68111000000 |
false |
patch |
[USN-6811-1], [CVE-2024-21011], [CVE-2024-21012], [CVE-2024-21068], [CVE-2024-21085], [CVE-2024-21094] |
USN-6811-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:68101000000 |
false |
patch |
[USN-6810-1], [CVE-2024-21011], [CVE-2024-21068], [CVE-2024-21085], [CVE-2024-21094] |
USN-6810-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:68091000000 |
false |
patch |
[USN-6809-1], [CVE-2022-3563], [CVE-2023-27349] |
USN-6809-1 -- BlueZ vulnerabilities |
| oval:com.ubuntu.jammy:def:68081000000 |
false |
patch |
[USN-6808-1], [CVE-2023-52076] |
USN-6808-1 -- Atril vulnerability |
| oval:com.ubuntu.jammy:def:68061000000 |
false |
patch |
[USN-6806-1], [CVE-2022-48622] |
USN-6806-1 -- GDK-PixBuf vulnerability |
| oval:com.ubuntu.jammy:def:68051000000 |
false |
patch |
[USN-6805-1], [CVE-2024-26256] |
USN-6805-1 -- libarchive vulnerability |
| oval:com.ubuntu.jammy:def:68041000000 |
false |
patch |
[USN-6804-1], [CVE-2024-33599], [CVE-2024-33600], [CVE-2024-33601], [CVE-2024-33602] |
USN-6804-1 -- GNU C Library vulnerabilities |
| oval:com.ubuntu.jammy:def:68021000000 |
false |
patch |
[USN-6802-1], [CVE-2024-4317] |
USN-6802-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:68011000000 |
false |
patch |
[USN-6801-1], [CVE-2024-36039] |
USN-6801-1 -- PyMySQL vulnerability |
| oval:com.ubuntu.jammy:def:68001000000 |
false |
patch |
[USN-6800-1], [CVE-2023-46234] |
USN-6800-1 -- browserify-sign vulnerability |
| oval:com.ubuntu.jammy:def:67991000000 |
false |
patch |
[USN-6799-1], [CVE-2024-34069] |
USN-6799-1 -- Werkzeug vulnerability |
| oval:com.ubuntu.jammy:def:67981000000 |
false |
patch |
[USN-6798-1], [CVE-2024-4453] |
USN-6798-1 -- GStreamer Base Plugins vulnerability |
| oval:com.ubuntu.jammy:def:67971000000 |
false |
patch |
[USN-6797-1], [CVE-2023-22655], [CVE-2023-28746], [CVE-2023-38575], [CVE-2023-39368], [CVE-2023-43490], [CVE-2023-45733], [CVE-2023-45745], [CVE-2023-46103], [CVE-2023-47855] |
USN-6797-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:67961000000 |
false |
patch |
[USN-6796-1], [CVE-2023-22745], [CVE-2024-29040] |
USN-6796-1 -- TPM2 Software Stack vulnerabilities |
| oval:com.ubuntu.jammy:def:67951000000 |
false |
patch |
[USN-6795-1], [CVE-2023-47233], [CVE-2023-52435], [CVE-2023-52486], [CVE-2023-52489], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52498], [CVE-2023-52530], [CVE-2023-52583], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52604], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52614], [CVE-2023-52615], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52627], [CVE-2023-52631], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2024-1151], [CVE-2024-2201], [CVE-2024-23849], [CVE-2024-26592], [CVE-2024-26593], [CVE-2024-26594], [CVE-2024-26600], [CVE-2024-26602], [CVE-2024-26606], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26614], [CVE-2024-26615], [CVE-2024-26622], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26635], [CVE-2024-26636], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26660], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26668], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26679], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26689], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26702], [CVE-2024-26704], [CVE-2024-26707], [CVE-2024-26712], [CVE-2024-26715], [CVE-2024-26717], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26808], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26829], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26920] |
USN-6795-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:67941000000 |
false |
patch |
[USN-6794-1], [CVE-2024-31948], [CVE-2024-31950], [CVE-2024-31951], [CVE-2024-34088] |
USN-6794-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:67931000000 |
false |
patch |
[USN-6793-1], [CVE-2024-32002], [CVE-2024-32004], [CVE-2024-32020], [CVE-2024-32021], [CVE-2024-32465] |
USN-6793-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:67921000000 |
false |
patch |
[USN-6792-1], [CVE-2021-23385] |
USN-6792-1 -- Flask-Security vulnerability |
| oval:com.ubuntu.jammy:def:67911000000 |
false |
patch |
[USN-6791-1], [CVE-2024-33655] |
USN-6791-1 -- Unbound vulnerability |
| oval:com.ubuntu.jammy:def:67901000000 |
false |
patch |
[USN-6790-1], [CVE-2024-28054] |
USN-6790-1 -- amavisd-new vulnerability |
| oval:com.ubuntu.jammy:def:67891000000 |
false |
patch |
[USN-6789-1], [CVE-2024-3044] |
USN-6789-1 -- LibreOffice vulnerability |
| oval:com.ubuntu.jammy:def:67881000000 |
false |
patch |
[USN-6788-1], [CVE-2024-27834] |
USN-6788-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:67871000000 |
false |
patch |
[USN-6787-1], [CVE-2024-34064] |
USN-6787-1 -- Jinja2 vulnerability |
| oval:com.ubuntu.jammy:def:67861000000 |
false |
patch |
[USN-6786-1], [CVE-2022-22995] |
USN-6786-1 -- Netatalk vulnerabilities |
| oval:com.ubuntu.jammy:def:67841000000 |
false |
patch |
[USN-6784-1], [CVE-2023-50471], [CVE-2023-50472], [CVE-2024-31755] |
USN-6784-1 -- cJSON vulnerabilities |
| oval:com.ubuntu.jammy:def:67831000000 |
false |
patch |
[USN-6783-1], [CVE-2023-47359], [CVE-2023-47360] |
USN-6783-1 -- VLC vulnerabilities |
| oval:com.ubuntu.jammy:def:67821000000 |
false |
patch |
[USN-6782-1], [CVE-2024-4367], [CVE-2024-4767], [CVE-2024-4768], [CVE-2024-4769], [CVE-2024-4770], [CVE-2024-4777] |
USN-6782-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:67811000000 |
false |
patch |
[USN-6781-1], [CVE-2023-7101] |
USN-6781-1 -- Spreadsheet::ParseExcel vulnerability |
| oval:com.ubuntu.jammy:def:67801000000 |
false |
patch |
[USN-6780-1], [CVE-2024-3651] |
USN-6780-1 -- idna vulnerability |
| oval:com.ubuntu.jammy:def:67752000000 |
false |
patch |
[USN-6775-2], [CVE-2023-47233], [CVE-2023-52530], [CVE-2024-26622] |
USN-6775-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67751000000 |
false |
patch |
[USN-6775-1], [CVE-2023-47233], [CVE-2023-52530], [CVE-2024-26622] |
USN-6775-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67741000000 |
false |
patch |
[USN-6774-1], [CVE-2023-47233], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52604], [CVE-2023-52615], [CVE-2024-2201], [CVE-2024-26614], [CVE-2024-26622], [CVE-2024-26635], [CVE-2024-26704], [CVE-2024-26801], [CVE-2024-26805] |
USN-6774-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67731000000 |
false |
patch |
[USN-6773-1], [CVE-2024-30045], [CVE-2024-30046] |
USN-6773-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:67721000000 |
false |
patch |
[USN-6772-1], [CVE-2022-4967] |
USN-6772-1 -- strongSwan vulnerability |
| oval:com.ubuntu.jammy:def:67711000000 |
false |
patch |
[USN-6771-1], [CVE-2024-4340] |
USN-6771-1 -- SQL parse vulnerability |
| oval:com.ubuntu.jammy:def:67701000000 |
false |
patch |
[USN-6770-1] |
USN-6770-1 -- Fossil regression |
| oval:com.ubuntu.jammy:def:67691000000 |
false |
patch |
[USN-6769-1], [CVE-2024-22368], [CVE-2024-23525] |
USN-6769-1 -- Spreadsheet::ParseXLSX vulnerabilities |
| oval:com.ubuntu.jammy:def:67681000000 |
false |
patch |
[USN-6768-1], [CVE-2024-34397] |
USN-6768-1 -- GLib vulnerability |
| oval:com.ubuntu.jammy:def:67663000000 |
false |
patch |
[USN-6766-3], [CVE-2023-52435], [CVE-2023-52486], [CVE-2023-52489], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52604], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52614], [CVE-2023-52615], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52627], [CVE-2023-52631], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2024-1151], [CVE-2024-2201], [CVE-2024-23849], [CVE-2024-26592], [CVE-2024-26593], [CVE-2024-26594], [CVE-2024-26600], [CVE-2024-26602], [CVE-2024-26606], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26614], [CVE-2024-26615], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26635], [CVE-2024-26636], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26660], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26668], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26679], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26689], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26702], [CVE-2024-26704], [CVE-2024-26707], [CVE-2024-26712], [CVE-2024-26715], [CVE-2024-26717], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26808], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26829], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26920] |
USN-6766-3 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:67662000000 |
false |
patch |
[USN-6766-2], [CVE-2023-52435], [CVE-2023-52486], [CVE-2023-52489], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52604], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52614], [CVE-2023-52615], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52627], [CVE-2023-52631], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2024-1151], [CVE-2024-2201], [CVE-2024-23849], [CVE-2024-26592], [CVE-2024-26593], [CVE-2024-26594], [CVE-2024-26600], [CVE-2024-26602], [CVE-2024-26606], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26614], [CVE-2024-26615], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26635], [CVE-2024-26636], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26660], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26668], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26679], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26689], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26702], [CVE-2024-26704], [CVE-2024-26707], [CVE-2024-26712], [CVE-2024-26715], [CVE-2024-26717], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26808], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26829], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26920] |
USN-6766-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67661000000 |
false |
patch |
[USN-6766-1], [CVE-2023-52435], [CVE-2023-52486], [CVE-2023-52489], [CVE-2023-52491], [CVE-2023-52492], [CVE-2023-52493], [CVE-2023-52494], [CVE-2023-52498], [CVE-2023-52583], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52604], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-52608], [CVE-2023-52614], [CVE-2023-52615], [CVE-2023-52616], [CVE-2023-52617], [CVE-2023-52618], [CVE-2023-52619], [CVE-2023-52622], [CVE-2023-52623], [CVE-2023-52627], [CVE-2023-52631], [CVE-2023-52633], [CVE-2023-52635], [CVE-2023-52637], [CVE-2023-52638], [CVE-2023-52642], [CVE-2023-52643], [CVE-2024-1151], [CVE-2024-2201], [CVE-2024-23849], [CVE-2024-26592], [CVE-2024-26593], [CVE-2024-26594], [CVE-2024-26600], [CVE-2024-26602], [CVE-2024-26606], [CVE-2024-26608], [CVE-2024-26610], [CVE-2024-26614], [CVE-2024-26615], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26635], [CVE-2024-26636], [CVE-2024-26640], [CVE-2024-26641], [CVE-2024-26644], [CVE-2024-26645], [CVE-2024-26660], [CVE-2024-26663], [CVE-2024-26664], [CVE-2024-26665], [CVE-2024-26668], [CVE-2024-26671], [CVE-2024-26673], [CVE-2024-26675], [CVE-2024-26676], [CVE-2024-26679], [CVE-2024-26684], [CVE-2024-26685], [CVE-2024-26689], [CVE-2024-26695], [CVE-2024-26696], [CVE-2024-26697], [CVE-2024-26698], [CVE-2024-26702], [CVE-2024-26704], [CVE-2024-26707], [CVE-2024-26712], [CVE-2024-26715], [CVE-2024-26717], [CVE-2024-26720], [CVE-2024-26722], [CVE-2024-26808], [CVE-2024-26825], [CVE-2024-26826], [CVE-2024-26829], [CVE-2024-26910], [CVE-2024-26916], [CVE-2024-26920] |
USN-6766-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67641000000 |
false |
patch |
[USN-6764-1], [CVE-2023-51792] |
USN-6764-1 -- libde265 vulnerability |
| oval:com.ubuntu.jammy:def:67611000000 |
false |
patch |
[USN-6761-1], [CVE-2024-30187] |
USN-6761-1 -- Anope vulnerability |
| oval:com.ubuntu.jammy:def:67601000000 |
false |
patch |
[USN-6760-1], [CVE-2023-4508] |
USN-6760-1 -- Gerbv vulnerability |
| oval:com.ubuntu.jammy:def:67581000000 |
false |
patch |
[USN-6758-1], [CVE-2022-46175] |
USN-6758-1 -- JSON5 vulnerability |
| oval:com.ubuntu.jammy:def:67572000000 |
false |
patch |
[USN-6757-2], [CVE-2022-4900], [CVE-2024-2756], [CVE-2024-3096] |
USN-6757-2 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:67571000000 |
false |
patch |
[USN-6757-1], [CVE-2022-4900], [CVE-2024-2756], [CVE-2024-3096] |
USN-6757-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:67561000000 |
false |
patch |
[USN-6756-1], [CVE-2024-32487] |
USN-6756-1 -- less vulnerability |
| oval:com.ubuntu.jammy:def:67551000000 |
false |
patch |
[USN-6755-1], [CVE-2023-7207] |
USN-6755-1 -- GNU cpio vulnerabilities |
| oval:com.ubuntu.jammy:def:67541000000 |
false |
patch |
[USN-6754-1], [CVE-2019-9511], [CVE-2019-9513], [CVE-2023-44487], [CVE-2024-28182] |
USN-6754-1 -- nghttp2 vulnerabilities |
| oval:com.ubuntu.jammy:def:67531000000 |
false |
patch |
[USN-6753-1], [CVE-2023-46233] |
USN-6753-1 -- CryptoJS vulnerability |
| oval:com.ubuntu.jammy:def:67521000000 |
false |
patch |
[USN-6752-1], [CVE-2024-32658], [CVE-2024-32659], [CVE-2024-32660], [CVE-2024-32661] |
USN-6752-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:67511000000 |
false |
patch |
[USN-6751-1], [CVE-2022-35229], [CVE-2022-35230] |
USN-6751-1 -- Zabbix vulnerabilities |
| oval:com.ubuntu.jammy:def:67501000000 |
false |
patch |
[USN-6750-1], [CVE-2024-3852], [CVE-2024-3854], [CVE-2024-3857], [CVE-2024-2609], [CVE-2024-3859], [CVE-2024-3861], [CVE-2024-3302], [CVE-2024-3864] |
USN-6750-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:67491000000 |
false |
patch |
[USN-6749-1], [CVE-2024-22211], [CVE-2024-32039], [CVE-2024-32040], [CVE-2024-32041], [CVE-2024-32458], [CVE-2024-32459], [CVE-2024-32460] |
USN-6749-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:67481000000 |
false |
patch |
[USN-6748-1], [CVE-2023-23627], [CVE-2023-36823] |
USN-6748-1 -- Sanitize vulnerabilities |
| oval:com.ubuntu.jammy:def:67461000000 |
false |
patch |
[USN-6746-1], [CVE-2024-24786] |
USN-6746-1 -- Google Guest Agent and Google OS Config Agent vulnerability |
| oval:com.ubuntu.jammy:def:67441000000 |
false |
patch |
[USN-6744-1], [CVE-2024-28219] |
USN-6744-1 -- Pillow vulnerability |
| oval:com.ubuntu.jammy:def:67433000000 |
false |
patch |
[USN-6743-3], [CVE-2023-52600], [CVE-2023-52603], [CVE-2024-26581], [CVE-2024-26589], [CVE-2024-26591] |
USN-6743-3 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:67432000000 |
false |
patch |
[USN-6743-2], [CVE-2023-52600], [CVE-2023-52603], [CVE-2024-26581], [CVE-2024-26589], [CVE-2024-26591] |
USN-6743-2 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:67431000000 |
false |
patch |
[USN-6743-1], [CVE-2023-52600], [CVE-2023-52603], [CVE-2024-26581], [CVE-2024-26589], [CVE-2024-26591] |
USN-6743-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67422000000 |
false |
patch |
[USN-6742-2], [CVE-2023-24023], [CVE-2023-52600], [CVE-2023-52603], [CVE-2024-26581] |
USN-6742-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67421000000 |
false |
patch |
[USN-6742-1], [CVE-2023-24023], [CVE-2023-52600], [CVE-2023-52603], [CVE-2024-26581] |
USN-6742-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67371000000 |
false |
patch |
[USN-6737-1], [CVE-2024-2961] |
USN-6737-1 -- GNU C Library vulnerability |
| oval:com.ubuntu.jammy:def:67361000000 |
false |
patch |
[USN-6736-1], [CVE-2016-9840], [CVE-2016-9841], [CVE-2018-25032], [CVE-2022-37434] |
USN-6736-1 -- klibc vulnerabilities |
| oval:com.ubuntu.jammy:def:67351000000 |
false |
patch |
[USN-6735-1], [CVE-2023-30588], [CVE-2023-30589], [CVE-2023-30590] |
USN-6735-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:67341000000 |
false |
patch |
[USN-6734-1], [CVE-2024-1441], [CVE-2024-2494], [CVE-2024-2496] |
USN-6734-1 -- libvirt vulnerabilities |
| oval:com.ubuntu.jammy:def:67331000000 |
false |
patch |
[USN-6733-1], [CVE-2024-28834], [CVE-2024-28835] |
USN-6733-1 -- GnuTLS vulnerabilities |
| oval:com.ubuntu.jammy:def:67321000000 |
false |
patch |
[USN-6732-1], [CVE-2023-42843], [CVE-2023-42950], [CVE-2023-42956], [CVE-2024-23252], [CVE-2024-23254], [CVE-2024-23263], [CVE-2024-23280], [CVE-2024-23284] |
USN-6732-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:67311000000 |
false |
patch |
[USN-6731-1], [CVE-2017-17042], [CVE-2019-1020001], [CVE-2024-27285] |
USN-6731-1 -- YARD vulnerabilities |
| oval:com.ubuntu.jammy:def:67301000000 |
false |
patch |
[USN-6730-1], [CVE-2022-29599] |
USN-6730-1 -- Apache Maven Shared Utils vulnerability |
| oval:com.ubuntu.jammy:def:67291000000 |
false |
patch |
[USN-6729-1], [CVE-2023-38709], [CVE-2024-24795], [CVE-2024-27316] |
USN-6729-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:67281000000 |
false |
patch |
[USN-6728-1], [CVE-2023-49288], [CVE-2023-5824], [CVE-2024-23638], [CVE-2024-25111], [CVE-2024-25617] |
USN-6728-1 -- Squid vulnerabilities |
| oval:com.ubuntu.jammy:def:67272000000 |
false |
patch |
[USN-6727-2] |
USN-6727-2 -- NSS regression |
| oval:com.ubuntu.jammy:def:67271000000 |
false |
patch |
[USN-6727-1], [CVE-2023-4421], [CVE-2023-5388], [CVE-2023-6135] |
USN-6727-1 -- NSS vulnerabilities |
| oval:com.ubuntu.jammy:def:67252000000 |
false |
patch |
[USN-6725-2], [CVE-2023-1194], [CVE-2023-32254], [CVE-2023-32258], [CVE-2023-38427], [CVE-2023-38430], [CVE-2023-38431], [CVE-2023-3867], [CVE-2023-46838], [CVE-2023-52340], [CVE-2023-52429], [CVE-2023-52436], [CVE-2023-52438], [CVE-2023-52439], [CVE-2023-52441], [CVE-2023-52442], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52451], [CVE-2023-52454], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52467], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52480], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52612], [CVE-2024-22705], [CVE-2024-23850], [CVE-2024-23851], [CVE-2024-24860], [CVE-2024-26586], [CVE-2024-26589], [CVE-2024-26591], [CVE-2024-26597], [CVE-2024-26598], [CVE-2024-26631], [CVE-2024-26633] |
USN-6725-2 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:67251000000 |
false |
patch |
[USN-6725-1], [CVE-2023-1194], [CVE-2023-32254], [CVE-2023-32258], [CVE-2023-38427], [CVE-2023-38430], [CVE-2023-38431], [CVE-2023-3867], [CVE-2023-46838], [CVE-2023-52340], [CVE-2023-52429], [CVE-2023-52436], [CVE-2023-52438], [CVE-2023-52439], [CVE-2023-52441], [CVE-2023-52442], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52451], [CVE-2023-52454], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52467], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52480], [CVE-2023-52609], [CVE-2023-52610], [CVE-2023-52612], [CVE-2024-22705], [CVE-2024-23850], [CVE-2024-23851], [CVE-2024-24860], [CVE-2024-26586], [CVE-2024-26589], [CVE-2024-26591], [CVE-2024-26597], [CVE-2024-26598], [CVE-2024-26631], [CVE-2024-26633] |
USN-6725-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67242000000 |
false |
patch |
[USN-6724-2], [CVE-2023-46838], [CVE-2023-50431], [CVE-2023-52429], [CVE-2023-52434], [CVE-2023-52435], [CVE-2023-52436], [CVE-2023-52438], [CVE-2023-52439], [CVE-2023-6610], [CVE-2024-22705], [CVE-2024-23850], [CVE-2024-23851] |
USN-6724-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67241000000 |
false |
patch |
[USN-6724-1], [CVE-2023-46838], [CVE-2023-50431], [CVE-2023-52429], [CVE-2023-52434], [CVE-2023-52435], [CVE-2023-52436], [CVE-2023-52438], [CVE-2023-52439], [CVE-2023-6610], [CVE-2024-22705], [CVE-2024-23850], [CVE-2024-23851] |
USN-6724-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67212000000 |
false |
patch |
[USN-6721-2] |
USN-6721-2 -- X.Org X Server regression |
| oval:com.ubuntu.jammy:def:67211000000 |
false |
patch |
[USN-6721-1], [CVE-2024-31080], [CVE-2024-31081], [CVE-2024-31082], [CVE-2024-31083] |
USN-6721-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:67201000000 |
false |
patch |
[USN-6720-1], [CVE-2023-39361] |
USN-6720-1 -- Cacti vulnerability |
| oval:com.ubuntu.jammy:def:67192000000 |
false |
patch |
[USN-6719-2], [CVE-2024-28085] |
USN-6719-2 -- util-linux vulnerability |
| oval:com.ubuntu.jammy:def:67191000000 |
false |
patch |
[USN-6719-1], [CVE-2024-28085] |
USN-6719-1 -- util-linux vulnerability |
| oval:com.ubuntu.jammy:def:67181000000 |
false |
patch |
[USN-6718-1], [CVE-2024-2004], [CVE-2024-2398] |
USN-6718-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:67171000000 |
false |
patch |
[USN-6717-1], [CVE-2024-0743], [CVE-2023-5388], [CVE-2024-2607], [CVE-2024-2608], [CVE-2024-2610], [CVE-2024-2611], [CVE-2024-2612], [CVE-2024-2614], [CVE-2024-2616] |
USN-6717-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:67151000000 |
false |
patch |
[USN-6715-1], [CVE-2024-1013] |
USN-6715-1 -- unixODBC vulnerability |
| oval:com.ubuntu.jammy:def:67141000000 |
false |
patch |
[USN-6714-1], [CVE-2023-27635] |
USN-6714-1 -- Debian Goodies vulnerability |
| oval:com.ubuntu.jammy:def:67081000000 |
false |
patch |
[USN-6708-1], [CVE-2023-46045] |
USN-6708-1 -- Graphviz vulnerability |
| oval:com.ubuntu.jammy:def:67074000000 |
false |
patch |
[USN-6707-4], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-26597], [CVE-2024-26599] |
USN-6707-4 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:67073000000 |
false |
patch |
[USN-6707-3], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-26597], [CVE-2024-26599] |
USN-6707-3 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:67071000000 |
false |
patch |
[USN-6707-1], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-26597], [CVE-2024-26599] |
USN-6707-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:67061000000 |
false |
patch |
[USN-6706-1], [CVE-2023-6039] |
USN-6706-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:67051000000 |
false |
patch |
[USN-6705-1], [CVE-2023-22995], [CVE-2023-23000], [CVE-2023-32247], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-24855] |
USN-6705-1 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:67044000000 |
false |
patch |
[USN-6704-4], [CVE-2023-23000], [CVE-2023-32247], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-24855] |
USN-6704-4 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:67043000000 |
false |
patch |
[USN-6704-3], [CVE-2023-23000], [CVE-2023-32247], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-24855] |
USN-6704-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:67042000000 |
false |
patch |
[USN-6704-2], [CVE-2023-23000], [CVE-2023-32247], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-24855] |
USN-6704-2 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:67041000000 |
false |
patch |
[USN-6704-1], [CVE-2023-23000], [CVE-2023-32247], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-24855] |
USN-6704-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66981000000 |
false |
patch |
[USN-6698-1], [CVE-2024-22667] |
USN-6698-1 -- Vim vulnerability |
| oval:com.ubuntu.jammy:def:66971000000 |
false |
patch |
[USN-6697-1], [CVE-2022-3715] |
USN-6697-1 -- Bash vulnerability |
| oval:com.ubuntu.jammy:def:66961000000 |
false |
patch |
[USN-6696-1], [CVE-2024-20918], [CVE-2024-20919], [CVE-2024-20921], [CVE-2024-20926], [CVE-2024-20945], [CVE-2024-20952] |
USN-6696-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:66951000000 |
false |
patch |
[USN-6695-1], [CVE-2019-18604], [CVE-2023-32668], [CVE-2024-25262] |
USN-6695-1 -- TeX Live vulnerabilities |
| oval:com.ubuntu.jammy:def:66941000000 |
false |
patch |
[USN-6694-1], [CVE-2023-52425], [CVE-2024-28757] |
USN-6694-1 -- Expat vulnerabilities |
| oval:com.ubuntu.jammy:def:66931000000 |
false |
patch |
[USN-6693-1], [CVE-2024-21392] |
USN-6693-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:66921000000 |
false |
patch |
[USN-6692-1], [CVE-2022-25647] |
USN-6692-1 -- Gson vulnerability |
| oval:com.ubuntu.jammy:def:66911000000 |
false |
patch |
[USN-6691-1], [CVE-2024-2182] |
USN-6691-1 -- OVN vulnerability |
| oval:com.ubuntu.jammy:def:66901000000 |
false |
patch |
[USN-6690-1], [CVE-2023-3966], [CVE-2023-5366] |
USN-6690-1 -- Open vSwitch vulnerabilities |
| oval:com.ubuntu.jammy:def:66881000000 |
false |
patch |
[USN-6688-1], [CVE-2023-46838], [CVE-2023-50431], [CVE-2023-52436], [CVE-2023-52438], [CVE-2023-52439], [CVE-2023-52443], [CVE-2023-52444], [CVE-2023-52445], [CVE-2023-52447], [CVE-2023-52448], [CVE-2023-52449], [CVE-2023-52451], [CVE-2023-52454], [CVE-2023-52456], [CVE-2023-52457], [CVE-2023-52458], [CVE-2023-52462], [CVE-2023-52463], [CVE-2023-52464], [CVE-2023-52467], [CVE-2023-52469], [CVE-2023-52470], [CVE-2023-52583], [CVE-2023-52584], [CVE-2023-52587], [CVE-2023-52588], [CVE-2023-52589], [CVE-2023-52593], [CVE-2023-52594], [CVE-2023-52595], [CVE-2023-52597], [CVE-2023-52598], [CVE-2023-52599], [CVE-2023-52600], [CVE-2023-52601], [CVE-2023-52602], [CVE-2023-52603], [CVE-2023-52604], [CVE-2023-52605], [CVE-2023-52606], [CVE-2023-52607], [CVE-2023-5633], [CVE-2023-6610], [CVE-2024-0340], [CVE-2024-1085], [CVE-2024-1086], [CVE-2024-23849], [CVE-2024-24860], [CVE-2024-26581], [CVE-2024-26588], [CVE-2024-26589], [CVE-2024-26591], [CVE-2024-26592], [CVE-2024-26594], [CVE-2024-26597], [CVE-2024-26598], [CVE-2024-26599], [CVE-2024-26600], [CVE-2024-26601], [CVE-2024-26624], [CVE-2024-26625], [CVE-2024-26627], [CVE-2024-26628] |
USN-6688-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:66871000000 |
false |
patch |
[USN-6687-1], [CVE-2012-6655] |
USN-6687-1 -- AccountsService vulnerability |
| oval:com.ubuntu.jammy:def:66865000000 |
false |
patch |
[USN-6686-5], [CVE-2023-22995], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607] |
USN-6686-5 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:66864000000 |
false |
patch |
[USN-6686-4], [CVE-2023-22995], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607] |
USN-6686-4 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:66863000000 |
false |
patch |
[USN-6686-3], [CVE-2023-22995], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607] |
USN-6686-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:66862000000 |
false |
patch |
[USN-6686-2], [CVE-2023-22995], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607] |
USN-6686-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66861000000 |
false |
patch |
[USN-6686-1], [CVE-2023-22995], [CVE-2023-4134], [CVE-2023-46343], [CVE-2023-46862], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2024-0340], [CVE-2024-0607] |
USN-6686-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66831000000 |
false |
patch |
[USN-6683-1], [CVE-2023-34624] |
USN-6683-1 -- HtmlCleaner vulnerability |
| oval:com.ubuntu.jammy:def:66821000000 |
false |
patch |
[USN-6682-1], [CVE-2020-11076], [CVE-2020-11077], [CVE-2022-23634], [CVE-2022-24790], [CVE-2023-40175], [CVE-2024-21647] |
USN-6682-1 -- Puma vulnerabilities |
| oval:com.ubuntu.jammy:def:66803000000 |
false |
patch |
[USN-6680-3], [CVE-2023-46343], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2023-6560], [CVE-2024-0607], [CVE-2024-25744] |
USN-6680-3 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:66802000000 |
false |
patch |
[USN-6680-2], [CVE-2023-46343], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2023-6560], [CVE-2024-0607], [CVE-2024-25744] |
USN-6680-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66801000000 |
false |
patch |
[USN-6680-1], [CVE-2023-46343], [CVE-2023-51779], [CVE-2023-51782], [CVE-2023-6121], [CVE-2023-6560], [CVE-2024-0607], [CVE-2024-25744] |
USN-6680-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66791000000 |
false |
patch |
[USN-6679-1], [CVE-2024-27913] |
USN-6679-1 -- FRR vulnerability |
| oval:com.ubuntu.jammy:def:66781000000 |
false |
patch |
[USN-6678-1], [CVE-2020-12278], [CVE-2020-12279], [CVE-2023-22742], [CVE-2024-24575], [CVE-2024-24577] |
USN-6678-1 -- libgit2 vulnerabilities |
| oval:com.ubuntu.jammy:def:66771000000 |
false |
patch |
[USN-6677-1], [CVE-2023-27102], [CVE-2023-27103], [CVE-2023-43887], [CVE-2023-47471], [CVE-2023-49465], [CVE-2023-49467], [CVE-2023-49468] |
USN-6677-1 -- libde265 vulnerabilities |
| oval:com.ubuntu.jammy:def:66761000000 |
false |
patch |
[USN-6676-1], [CVE-2024-25629] |
USN-6676-1 -- c-ares vulnerability |
| oval:com.ubuntu.jammy:def:66751000000 |
false |
patch |
[USN-6675-1], [CVE-2022-24720] |
USN-6675-1 -- ImageProcessing vulnerability |
| oval:com.ubuntu.jammy:def:66741000000 |
false |
patch |
[USN-6674-1], [CVE-2024-27351] |
USN-6674-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:66731000000 |
false |
patch |
[USN-6673-1], [CVE-2023-50782], [CVE-2024-26130] |
USN-6673-1 -- python-cryptography vulnerabilities |
| oval:com.ubuntu.jammy:def:66721000000 |
false |
patch |
[USN-6672-1], [CVE-2023-23919], [CVE-2023-23920], [CVE-2023-2650] |
USN-6672-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:66711000000 |
false |
patch |
[USN-6671-1], [CVE-2023-29197] |
USN-6671-1 -- php-nyholm-psr7 vulnerability |
| oval:com.ubuntu.jammy:def:66701000000 |
false |
patch |
[USN-6670-1], [CVE-2022-24775], [CVE-2023-29197] |
USN-6670-1 -- php-guzzlehttp-psr7 vulnerabilities |
| oval:com.ubuntu.jammy:def:66691000000 |
false |
patch |
[USN-6669-1], [CVE-2024-0741], [CVE-2024-0742], [CVE-2024-0746], [CVE-2024-0747], [CVE-2024-0749], [CVE-2024-0750], [CVE-2024-0751], [CVE-2024-0753], [CVE-2024-0755], [CVE-2024-1546], [CVE-2024-1547], [CVE-2024-1548], [CVE-2024-1549], [CVE-2024-1550], [CVE-2024-1551], [CVE-2024-1552], [CVE-2024-1553], [CVE-2024-1936] |
USN-6669-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:66681000000 |
false |
patch |
[USN-6668-1], [CVE-2023-6110] |
USN-6668-1 -- python-openstackclient vulnerability |
| oval:com.ubuntu.jammy:def:66671000000 |
false |
patch |
[USN-6667-1], [CVE-2022-48623] |
USN-6667-1 -- Cpanel-JSON-XS vulnerability |
| oval:com.ubuntu.jammy:def:66661000000 |
false |
patch |
[USN-6666-1], [CVE-2024-24806] |
USN-6666-1 -- libuv vulnerability |
| oval:com.ubuntu.jammy:def:66651000000 |
false |
patch |
[USN-6665-1], [CVE-2023-50387], [CVE-2023-50868] |
USN-6665-1 -- Unbound vulnerabilities |
| oval:com.ubuntu.jammy:def:66641000000 |
false |
patch |
[USN-6664-1], [CVE-2022-48624] |
USN-6664-1 -- less vulnerability |
| oval:com.ubuntu.jammy:def:66631000000 |
false |
patch |
[USN-6663-1] |
USN-6663-1 -- OpenSSL update |
| oval:com.ubuntu.jammy:def:66621000000 |
false |
patch |
[USN-6662-1], [CVE-2024-20918], [CVE-2024-20919], [CVE-2024-20921], [CVE-2024-20945], [CVE-2024-20952] |
USN-6662-1 -- OpenJDK 21 vulnerabilities |
| oval:com.ubuntu.jammy:def:66611000000 |
false |
patch |
[USN-6661-1], [CVE-2024-20918], [CVE-2024-20919], [CVE-2024-20921], [CVE-2024-20932], [CVE-2024-20945], [CVE-2024-20952] |
USN-6661-1 -- OpenJDK 17 vulnerabilities |
| oval:com.ubuntu.jammy:def:66601000000 |
false |
patch |
[USN-6660-1], [CVE-2024-20918], [CVE-2024-20919], [CVE-2024-20921], [CVE-2024-20926], [CVE-2024-20945], [CVE-2024-20952] |
USN-6660-1 -- OpenJDK 11 vulnerabilities |
| oval:com.ubuntu.jammy:def:66591000000 |
false |
patch |
[USN-6659-1], [CVE-2022-43244], [CVE-2022-43245], [CVE-2022-43249], [CVE-2022-43250], [CVE-2022-47665], [CVE-2023-24751], [CVE-2023-24752], [CVE-2023-24754], [CVE-2023-24755], [CVE-2023-24756], [CVE-2023-24757], [CVE-2023-24758], [CVE-2023-25221] |
USN-6659-1 -- libde265 vulnerabilities |
| oval:com.ubuntu.jammy:def:66581000000 |
false |
patch |
[USN-6658-1], [CVE-2024-25062] |
USN-6658-1 -- libxml2 vulnerability |
| oval:com.ubuntu.jammy:def:66571000000 |
false |
patch |
[USN-6657-1], [CVE-2023-28450], [CVE-2023-50387], [CVE-2023-50868] |
USN-6657-1 -- Dnsmasq vulnerabilities |
| oval:com.ubuntu.jammy:def:66561000000 |
false |
patch |
[USN-6656-1], [CVE-2024-0985] |
USN-6656-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:66551000000 |
false |
patch |
[USN-6655-1], [CVE-2022-47695], [CVE-2022-48063], [CVE-2022-48065] |
USN-6655-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:66541000000 |
false |
patch |
[USN-6654-1], [CVE-2023-43770] |
USN-6654-1 -- Roundcube Webmail vulnerability |
| oval:com.ubuntu.jammy:def:66534000000 |
false |
patch |
[USN-6653-4], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0646] |
USN-6653-4 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:66533000000 |
false |
patch |
[USN-6653-3], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0646] |
USN-6653-3 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:66532000000 |
false |
patch |
[USN-6653-2], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0646] |
USN-6653-2 -- Linux kernel (AWS) vulnerabilities |
| oval:com.ubuntu.jammy:def:66531000000 |
false |
patch |
[USN-6653-1], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0646] |
USN-6653-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66513000000 |
false |
patch |
[USN-6651-3], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0582], [CVE-2024-0646] |
USN-6651-3 -- Linux kernel (StarFive) vulnerabilities |
| oval:com.ubuntu.jammy:def:66512000000 |
false |
patch |
[USN-6651-2], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0582], [CVE-2024-0646] |
USN-6651-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66511000000 |
false |
patch |
[USN-6651-1], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-6915], [CVE-2024-0565], [CVE-2024-0582], [CVE-2024-0646] |
USN-6651-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66501000000 |
false |
patch |
[USN-6650-1], [CVE-2023-6915] |
USN-6650-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:66442000000 |
false |
patch |
[USN-6644-2], [CVE-2023-52356], [CVE-2023-6228], [CVE-2023-6277] |
USN-6644-2 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:66431000000 |
false |
patch |
[USN-6643-1], [CVE-2023-42282] |
USN-6643-1 -- NPM IP vulnerability |
| oval:com.ubuntu.jammy:def:66401000000 |
false |
patch |
[USN-6640-1], [CVE-2023-4641] |
USN-6640-1 -- shadow vulnerability |
| oval:com.ubuntu.jammy:def:66391000000 |
false |
patch |
[USN-6639-1], [CVE-2023-51780], [CVE-2023-51781], [CVE-2023-51782], [CVE-2023-6121], [CVE-2023-6531], [CVE-2023-6622], [CVE-2023-6932], [CVE-2024-0565], [CVE-2024-0607], [CVE-2024-0646], [CVE-2024-22705] |
USN-6639-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:66381000000 |
false |
patch |
[USN-6638-1], [CVE-2022-36763], [CVE-2022-36764], [CVE-2022-36765], [CVE-2023-45230], [CVE-2023-45231], [CVE-2023-45232], [CVE-2023-45233], [CVE-2023-45234], [CVE-2023-45235], [CVE-2023-48733] |
USN-6638-1 -- EDK II vulnerabilities |
| oval:com.ubuntu.jammy:def:66351000000 |
false |
patch |
[USN-6635-1], [CVE-2023-37453], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6635-1 -- Linux kernel (GCP) vulnerabilities |
| oval:com.ubuntu.jammy:def:66341000000 |
false |
patch |
[USN-6634-1], [CVE-2024-21386], [CVE-2024-21404] |
USN-6634-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:66331000000 |
false |
patch |
[USN-6633-1], [CVE-2023-4408], [CVE-2023-50387], [CVE-2023-50868], [CVE-2023-5517], [CVE-2023-5679] |
USN-6633-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:66311000000 |
false |
patch |
[USN-6631-1], [CVE-2024-23206], [CVE-2024-23213], [CVE-2024-23222] |
USN-6631-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:66301000000 |
false |
patch |
[USN-6630-1], [CVE-2024-1141] |
USN-6630-1 -- Glance_store vulnerability |
| oval:com.ubuntu.jammy:def:66291000000 |
false |
patch |
[USN-6629-1], [CVE-2021-45958], [CVE-2022-31116], [CVE-2022-31117] |
USN-6629-1 -- UltraJSON vulnerabilities |
| oval:com.ubuntu.jammy:def:66281000000 |
false |
patch |
[USN-6628-1], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-34324], [CVE-2023-35827], [CVE-2023-46813], [CVE-2023-6039], [CVE-2023-6040], [CVE-2023-6176], [CVE-2023-6606], [CVE-2023-6622], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193], [CVE-2024-0641] |
USN-6628-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:66271000000 |
false |
patch |
[USN-6627-1], [CVE-2021-35452], [CVE-2021-36408], [CVE-2021-36409], [CVE-2021-36410], [CVE-2021-36411], [CVE-2022-1253], [CVE-2022-43235], [CVE-2022-43236], [CVE-2022-43237], [CVE-2022-43238], [CVE-2022-43239], [CVE-2022-43240], [CVE-2022-43241], [CVE-2022-43242], [CVE-2022-43243], [CVE-2022-43248], [CVE-2022-43252], [CVE-2022-43253] |
USN-6627-1 -- libde265 vulnerabilities |
| oval:com.ubuntu.jammy:def:66263000000 |
false |
patch |
[USN-6626-3], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-34324], [CVE-2023-35827], [CVE-2023-46813], [CVE-2023-6039], [CVE-2023-6176], [CVE-2023-6622], [CVE-2024-0641] |
USN-6626-3 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:66262000000 |
false |
patch |
[USN-6626-2], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-34324], [CVE-2023-35827], [CVE-2023-46813], [CVE-2023-6039], [CVE-2023-6176], [CVE-2023-6622], [CVE-2024-0641] |
USN-6626-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66261000000 |
false |
patch |
[USN-6626-1], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-34324], [CVE-2023-35827], [CVE-2023-46813], [CVE-2023-6039], [CVE-2023-6176], [CVE-2023-6622], [CVE-2024-0641] |
USN-6626-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66241000000 |
false |
patch |
[USN-6624-1], [CVE-2023-34324], [CVE-2023-35827], [CVE-2023-46813], [CVE-2023-46862], [CVE-2023-5972], [CVE-2023-6176], [CVE-2023-6531], [CVE-2023-6622], [CVE-2024-0641] |
USN-6624-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66231000000 |
false |
patch |
[USN-6623-1], [CVE-2024-24680] |
USN-6623-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:66221000000 |
false |
patch |
[USN-6622-1], [CVE-2023-5678], [CVE-2023-6129], [CVE-2023-6237], [CVE-2024-0727] |
USN-6622-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:66211000000 |
false |
patch |
[USN-6621-1], [CVE-2023-5341] |
USN-6621-1 -- ImageMagick vulnerability |
| oval:com.ubuntu.jammy:def:66191000000 |
false |
patch |
[USN-6619-1], [CVE-2024-21626] |
USN-6619-1 -- runC vulnerability |
| oval:com.ubuntu.jammy:def:66181000000 |
false |
patch |
[USN-6618-1], [CVE-2023-44271], [CVE-2023-50447] |
USN-6618-1 -- Pillow vulnerabilities |
| oval:com.ubuntu.jammy:def:66161000000 |
false |
patch |
[USN-6616-1], [CVE-2023-2953] |
USN-6616-1 -- OpenLDAP vulnerability |
| oval:com.ubuntu.jammy:def:66151000000 |
false |
patch |
[USN-6615-1], [CVE-2024-20960], [CVE-2024-20961], [CVE-2024-20962], [CVE-2024-20963], [CVE-2024-20964], [CVE-2024-20965], [CVE-2024-20966], [CVE-2024-20967], [CVE-2024-20969], [CVE-2024-20970], [CVE-2024-20971], [CVE-2024-20972], [CVE-2024-20973], [CVE-2024-20974], [CVE-2024-20976], [CVE-2024-20977], [CVE-2024-20978], [CVE-2024-20981], [CVE-2024-20982], [CVE-2024-20983], [CVE-2024-20984], [CVE-2024-20985] |
USN-6615-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:66141000000 |
false |
patch |
[USN-6614-1], [CVE-2023-30577] |
USN-6614-1 -- amanda vulnerability |
| oval:com.ubuntu.jammy:def:66131000000 |
false |
patch |
[USN-6613-1], [CVE-2023-43040] |
USN-6613-1 -- Ceph vulnerability |
| oval:com.ubuntu.jammy:def:66121000000 |
false |
patch |
[USN-6612-1], [CVE-2023-34194] |
USN-6612-1 -- TinyXML vulnerability |
| oval:com.ubuntu.jammy:def:66111000000 |
false |
patch |
[USN-6611-1], [CVE-2023-51766] |
USN-6611-1 -- Exim vulnerability |
| oval:com.ubuntu.jammy:def:66093000000 |
false |
patch |
[USN-6609-3], [CVE-2023-6040], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6609-3 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:66092000000 |
false |
patch |
[USN-6609-2], [CVE-2023-6040], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6609-2 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:66091000000 |
false |
patch |
[USN-6609-1], [CVE-2023-6040], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6609-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66082000000 |
false |
patch |
[USN-6608-2], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6608-2 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:66081000000 |
false |
patch |
[USN-6608-1], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6608-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:66071000000 |
false |
patch |
[USN-6607-1], [CVE-2023-5345], [CVE-2023-6040], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2023-6932], [CVE-2024-0193] |
USN-6607-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:66061000000 |
false |
patch |
[USN-6606-1], [CVE-2023-51779], [CVE-2023-6606], [CVE-2023-6817], [CVE-2023-6931], [CVE-2024-0193] |
USN-6606-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:66001000000 |
false |
patch |
[USN-6600-1], [CVE-2022-47015], [CVE-2023-22084] |
USN-6600-1 -- MariaDB vulnerabilities |
| oval:com.ubuntu.jammy:def:65991000000 |
false |
patch |
[USN-6599-1], [CVE-2020-28493], [CVE-2024-22195] |
USN-6599-1 -- Jinja2 vulnerabilities |
| oval:com.ubuntu.jammy:def:65981000000 |
false |
patch |
[USN-6598-1], [CVE-2023-48795] |
USN-6598-1 -- Paramiko vulnerability |
| oval:com.ubuntu.jammy:def:65951000000 |
false |
patch |
[USN-6595-1], [CVE-2023-52323] |
USN-6595-1 -- PyCryptodome vulnerability |
| oval:com.ubuntu.jammy:def:65941000000 |
false |
patch |
[USN-6594-1], [CVE-2023-49285], [CVE-2023-49286], [CVE-2023-50269] |
USN-6594-1 -- Squid vulnerabilities |
| oval:com.ubuntu.jammy:def:65931000000 |
false |
patch |
[USN-6593-1], [CVE-2024-0553], [CVE-2024-0567] |
USN-6593-1 -- GnuTLS vulnerabilities |
| oval:com.ubuntu.jammy:def:65921000000 |
false |
patch |
[USN-6592-1], [CVE-2023-6004], [CVE-2023-6918] |
USN-6592-1 -- libssh vulnerabilities |
| oval:com.ubuntu.jammy:def:65912000000 |
false |
patch |
[USN-6591-2], [CVE-2023-51764] |
USN-6591-2 -- Postfix update |
| oval:com.ubuntu.jammy:def:65911000000 |
false |
patch |
[USN-6591-1], [CVE-2023-51764] |
USN-6591-1 -- Postfix vulnerability |
| oval:com.ubuntu.jammy:def:65901000000 |
false |
patch |
[USN-6590-1], [CVE-2018-1311], [CVE-2023-37536] |
USN-6590-1 -- Xerces-C++ vulnerabilities |
| oval:com.ubuntu.jammy:def:65891000000 |
false |
patch |
[USN-6589-1], [CVE-2023-48795] |
USN-6589-1 -- FileZilla vulnerability |
| oval:com.ubuntu.jammy:def:65881000000 |
false |
patch |
[USN-6588-1], [CVE-2024-22365] |
USN-6588-1 -- PAM vulnerability |
| oval:com.ubuntu.jammy:def:65873000000 |
false |
patch |
[USN-6587-3] |
USN-6587-3 -- X.Org X Server regression |
| oval:com.ubuntu.jammy:def:65871000000 |
false |
patch |
[USN-6587-1], [CVE-2023-6816], [CVE-2024-0229], [CVE-2024-0408], [CVE-2024-0409], [CVE-2024-21885], [CVE-2024-21886] |
USN-6587-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:65861000000 |
false |
patch |
[USN-6586-1], [CVE-2019-12211], [CVE-2019-12213], [CVE-2020-21427], [CVE-2020-21428], [CVE-2020-22524] |
USN-6586-1 -- FreeImage vulnerabilities |
| oval:com.ubuntu.jammy:def:65821000000 |
false |
patch |
[USN-6582-1], [CVE-2023-42883] |
USN-6582-1 -- WebKitGTK vulnerability |
| oval:com.ubuntu.jammy:def:65811000000 |
false |
patch |
[USN-6581-1], [CVE-2022-44840], [CVE-2022-45703], [CVE-2022-47007], [CVE-2022-47008], [CVE-2022-47010], [CVE-2022-47011] |
USN-6581-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:65801000000 |
false |
patch |
[USN-6580-1], [CVE-2023-4255] |
USN-6580-1 -- w3m vulnerability |
| oval:com.ubuntu.jammy:def:65792000000 |
false |
patch |
[USN-6579-2], [CVE-2018-1311] |
USN-6579-2 -- Xerces-C++ vulnerability |
| oval:com.ubuntu.jammy:def:65781000000 |
false |
patch |
[USN-6578-1], [CVE-2024-0057], [CVE-2024-21319] |
USN-6578-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:65761000000 |
false |
patch |
[USN-6576-1], [CVE-2023-6111] |
USN-6576-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:65751000000 |
false |
patch |
[USN-6575-1], [CVE-2022-39348], [CVE-2023-46137] |
USN-6575-1 -- Twisted vulnerabilities |
| oval:com.ubuntu.jammy:def:65741000000 |
false |
patch |
[USN-6574-1], [CVE-2023-39318], [CVE-2023-39319], [CVE-2023-39323], [CVE-2023-39325], [CVE-2023-39326], [CVE-2023-44487], [CVE-2023-45285] |
USN-6574-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:65711000000 |
false |
patch |
[USN-6571-1], [CVE-2022-26563] |
USN-6571-1 -- Monit vulnerability |
| oval:com.ubuntu.jammy:def:65691000000 |
false |
patch |
[USN-6569-1], [CVE-2022-30333], [CVE-2023-40477] |
USN-6569-1 -- libclamunrar vulnerabilities |
| oval:com.ubuntu.jammy:def:65681000000 |
false |
patch |
[USN-6568-1] |
USN-6568-1 -- ClamAV update |
| oval:com.ubuntu.jammy:def:65672000000 |
false |
patch |
[USN-6567-2] |
USN-6567-2 -- QEMU regression |
| oval:com.ubuntu.jammy:def:65671000000 |
false |
patch |
[USN-6567-1], [CVE-2020-14394], [CVE-2020-24165], [CVE-2021-3611], [CVE-2021-3638], [CVE-2023-1544], [CVE-2023-2861], [CVE-2023-3180], [CVE-2023-3255], [CVE-2023-3301], [CVE-2023-3354], [CVE-2023-40360], [CVE-2023-4135], [CVE-2023-42467], [CVE-2023-5088] |
USN-6567-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:65661000000 |
false |
patch |
[USN-6566-1], [CVE-2022-46908], [CVE-2023-7104] |
USN-6566-1 -- SQLite vulnerabilities |
| oval:com.ubuntu.jammy:def:65651000000 |
false |
patch |
[USN-6565-1], [CVE-2021-41617], [CVE-2023-51384], [CVE-2023-51385] |
USN-6565-1 -- OpenSSH vulnerabilities |
| oval:com.ubuntu.jammy:def:65641000000 |
false |
patch |
[USN-6564-1], [CVE-2022-4304], [CVE-2022-4450], [CVE-2023-0215], [CVE-2023-0286], [CVE-2023-0401] |
USN-6564-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:65631000000 |
false |
patch |
[USN-6563-1], [CVE-2023-50762], [CVE-2023-50761], [CVE-2023-6856], [CVE-2023-6857], [CVE-2023-6858], [CVE-2023-6859], [CVE-2023-6860], [CVE-2023-6861], [CVE-2023-6862], [CVE-2023-6863], [CVE-2023-6864] |
USN-6563-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:65611000000 |
false |
patch |
[USN-6561-1], [CVE-2023-48795] |
USN-6561-1 -- libssh vulnerability |
| oval:com.ubuntu.jammy:def:65601000000 |
false |
patch |
[USN-6560-1], [CVE-2023-28531], [CVE-2023-48795] |
USN-6560-1 -- OpenSSH vulnerabilities |
| oval:com.ubuntu.jammy:def:65591000000 |
false |
patch |
[USN-6559-1], [CVE-2019-0201], [CVE-2023-44981] |
USN-6559-1 -- ZooKeeper vulnerabilities |
| oval:com.ubuntu.jammy:def:65581000000 |
false |
patch |
[USN-6558-1], [CVE-2018-13440], [CVE-2018-17095], [CVE-2019-13147], [CVE-2022-24599] |
USN-6558-1 -- audiofile vulnerabilities |
| oval:com.ubuntu.jammy:def:65571000000 |
false |
patch |
[USN-6557-1], [CVE-2022-1725], [CVE-2022-1771], [CVE-2022-1886], [CVE-2022-1897], [CVE-2022-2000], [CVE-2022-2042], [CVE-2023-46246], [CVE-2023-48231], [CVE-2023-48232], [CVE-2023-48233], [CVE-2023-48234], [CVE-2023-48235], [CVE-2023-48236], [CVE-2023-48237], [CVE-2023-48706] |
USN-6557-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:65561000000 |
false |
patch |
[USN-6556-1], [CVE-2023-49342], [CVE-2023-49343], [CVE-2023-49344], [CVE-2023-49345], [CVE-2023-49346], [CVE-2023-49347] |
USN-6556-1 -- Budgie Extras vulnerabilities |
| oval:com.ubuntu.jammy:def:65551000000 |
false |
patch |
[USN-6555-1], [CVE-2023-6377], [CVE-2023-6478] |
USN-6555-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:65541000000 |
false |
patch |
[USN-6554-1], [CVE-2023-5616] |
USN-6554-1 -- GNOME Settings vulnerability |
| oval:com.ubuntu.jammy:def:65521000000 |
false |
patch |
[USN-6552-1], [CVE-2023-42464] |
USN-6552-1 -- Netatalk vulnerability |
| oval:com.ubuntu.jammy:def:65511000000 |
false |
patch |
[USN-6551-1], [CVE-2023-46751] |
USN-6551-1 -- Ghostscript vulnerability |
| oval:com.ubuntu.jammy:def:65501000000 |
false |
patch |
[USN-6550-1], [CVE-2022-29221], [CVE-2022-31129], [CVE-2023-28447] |
USN-6550-1 -- PostfixAdmin vulnerabilities |
| oval:com.ubuntu.jammy:def:65494000000 |
false |
patch |
[USN-6549-4], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717] |
USN-6549-4 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:65493000000 |
false |
patch |
[USN-6549-3], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717] |
USN-6549-3 -- Linux kernel (Low Latency) vulnerabilities |
| oval:com.ubuntu.jammy:def:65492000000 |
false |
patch |
[USN-6549-2], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717] |
USN-6549-2 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:65491000000 |
false |
patch |
[USN-6549-1], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717] |
USN-6549-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65462000000 |
false |
patch |
[USN-6546-2], [CVE-2023-6185], [CVE-2023-6186] |
USN-6546-2 -- LibreOffice vulnerabilities |
| oval:com.ubuntu.jammy:def:65451000000 |
false |
patch |
[USN-6545-1], [CVE-2023-42916], [CVE-2023-42917] |
USN-6545-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:65441000000 |
false |
patch |
[USN-6544-1], [CVE-2020-19726], [CVE-2021-46174], [CVE-2022-35205], [CVE-2022-38533], [CVE-2022-4285] |
USN-6544-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:65431000000 |
false |
patch |
[USN-6543-1], [CVE-2023-39804] |
USN-6543-1 -- GNU Tar vulnerability |
| oval:com.ubuntu.jammy:def:65412000000 |
false |
patch |
[USN-6541-2] |
USN-6541-2 -- GNU C Library regression |
| oval:com.ubuntu.jammy:def:65411000000 |
false |
patch |
[USN-6541-1], [CVE-2023-4806], [CVE-2023-4813], [CVE-2023-5156] |
USN-6541-1 -- GNU C Library vulnerabilities |
| oval:com.ubuntu.jammy:def:65401000000 |
false |
patch |
[USN-6540-1], [CVE-2023-45866] |
USN-6540-1 -- BlueZ vulnerability |
| oval:com.ubuntu.jammy:def:65391000000 |
false |
patch |
[USN-6539-1], [CVE-2023-23931], [CVE-2023-49083] |
USN-6539-1 -- python-cryptography vulnerabilities |
| oval:com.ubuntu.jammy:def:65381000000 |
false |
patch |
[USN-6538-1], [CVE-2023-5868], [CVE-2023-5869], [CVE-2023-5870] |
USN-6538-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:65361000000 |
false |
patch |
[USN-6536-1], [CVE-2023-39189], [CVE-2023-42754], [CVE-2023-45898], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717] |
USN-6536-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65351000000 |
false |
patch |
[USN-6535-1], [CVE-2023-46218], [CVE-2023-46219] |
USN-6535-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:65343000000 |
false |
patch |
[USN-6534-3], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717], [CVE-2023-6039] |
USN-6534-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65341000000 |
false |
patch |
[USN-6534-1], [CVE-2023-37453], [CVE-2023-3773], [CVE-2023-39189], [CVE-2023-39192], [CVE-2023-39193], [CVE-2023-39194], [CVE-2023-39198], [CVE-2023-42754], [CVE-2023-5158], [CVE-2023-5178], [CVE-2023-5717], [CVE-2023-6039] |
USN-6534-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65331000000 |
false |
patch |
[USN-6533-1], [CVE-2023-46813], [CVE-2023-46862] |
USN-6533-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:65311000000 |
false |
patch |
[USN-6531-1], [CVE-2022-24834], [CVE-2022-35977], [CVE-2022-36021], [CVE-2023-25155], [CVE-2023-28856], [CVE-2023-45145] |
USN-6531-1 -- Redis vulnerabilities |
| oval:com.ubuntu.jammy:def:65301000000 |
false |
patch |
[USN-6530-1], [CVE-2023-45539] |
USN-6530-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:65291000000 |
false |
patch |
[USN-6529-1], [CVE-2021-38562], [CVE-2022-25802], [CVE-2023-41259], [CVE-2023-41260] |
USN-6529-1 -- Request Tracker vulnerabilities |
| oval:com.ubuntu.jammy:def:65281000000 |
false |
patch |
[USN-6528-1], [CVE-2022-40433], [CVE-2023-22025], [CVE-2023-22067], [CVE-2023-22081] |
USN-6528-1 -- OpenJDK 8 vulnerabilities |
| oval:com.ubuntu.jammy:def:65271000000 |
false |
patch |
[USN-6527-1], [CVE-2023-22025], [CVE-2023-22081] |
USN-6527-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:65261000000 |
false |
patch |
[USN-6526-1], [CVE-2023-37329], [CVE-2023-40474], [CVE-2023-40475], [CVE-2023-40476], [CVE-2023-44429], [CVE-2023-44446] |
USN-6526-1 -- GStreamer Bad Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:65251000000 |
false |
patch |
[USN-6525-1], [CVE-2022-37454] |
USN-6525-1 -- pysha3 vulnerability |
| oval:com.ubuntu.jammy:def:65241000000 |
false |
patch |
[USN-6524-1], [CVE-2022-37454] |
USN-6524-1 -- PyPy vulnerability |
| oval:com.ubuntu.jammy:def:65231000000 |
false |
patch |
[USN-6523-1], [CVE-2022-30790], [CVE-2022-30552], [CVE-2022-2347] |
USN-6523-1 -- u-boot-nezha vulnerability |
| oval:com.ubuntu.jammy:def:65221000000 |
false |
patch |
[USN-6522-1], [CVE-2022-41877], [CVE-2023-39352], [CVE-2023-39356] |
USN-6522-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:65211000000 |
false |
patch |
[USN-6521-1], [CVE-2022-30067], [CVE-2022-32990], [CVE-2023-44441], [CVE-2023-44442], [CVE-2023-44443], [CVE-2023-44444] |
USN-6521-1 -- GIMP vulnerabilities |
| oval:com.ubuntu.jammy:def:65201000000 |
false |
patch |
[USN-6520-1], [CVE-2023-25775], [CVE-2023-31083], [CVE-2023-31085], [CVE-2023-3772], [CVE-2023-38430], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-3867], [CVE-2023-4132], [CVE-2023-4134], [CVE-2023-44466], [CVE-2023-45871], [CVE-2023-5090], [CVE-2023-5345] |
USN-6520-1 -- Linux kernel (StarFive) vulnerabilities |
| oval:com.ubuntu.jammy:def:65171000000 |
false |
patch |
[USN-6517-1], [CVE-2022-48522], [CVE-2023-47038] |
USN-6517-1 -- Perl vulnerabilities |
| oval:com.ubuntu.jammy:def:65161000000 |
false |
patch |
[USN-6516-1], [CVE-2023-25775], [CVE-2023-31083], [CVE-2023-31085], [CVE-2023-3772], [CVE-2023-45871] |
USN-6516-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:65151000000 |
false |
patch |
[USN-6515-1], [CVE-2023-6204], [CVE-2023-6205], [CVE-2023-6206], [CVE-2023-6207], [CVE-2023-6208], [CVE-2023-6209], [CVE-2023-6212] |
USN-6515-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:65132000000 |
false |
patch |
[USN-6513-2], [CVE-2023-40217] |
USN-6513-2 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:65121000000 |
false |
patch |
[USN-6512-1], [CVE-2022-40090], [CVE-2023-3576] |
USN-6512-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:65111000000 |
false |
patch |
[USN-6511-1], [CVE-2013-20001] |
USN-6511-1 -- OpenZFS vulnerability |
| oval:com.ubuntu.jammy:def:65081000000 |
false |
patch |
[USN-6508-1], [CVE-2020-23804], [CVE-2022-37050], [CVE-2022-37051], [CVE-2022-37052], [CVE-2022-38349] |
USN-6508-1 -- poppler vulnerabilities |
| oval:com.ubuntu.jammy:def:65071000000 |
false |
patch |
[USN-6507-1], [CVE-2022-48340] |
USN-6507-1 -- GlusterFS vulnerability |
| oval:com.ubuntu.jammy:def:65061000000 |
false |
patch |
[USN-6506-1], [CVE-2023-31122], [CVE-2023-43622], [CVE-2023-45802] |
USN-6506-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:65051000000 |
false |
patch |
[USN-6505-1], [CVE-2023-44487] |
USN-6505-1 -- nghttp2 vulnerability |
| oval:com.ubuntu.jammy:def:65041000000 |
false |
patch |
[USN-6504-1], [CVE-2023-5557] |
USN-6504-1 -- tracker-miners vulnerability |
| oval:com.ubuntu.jammy:def:65031000000 |
false |
patch |
[USN-6503-1], [CVE-2023-31085], [CVE-2023-4244], [CVE-2023-5090], [CVE-2023-5345], [CVE-2023-5633] |
USN-6503-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65024000000 |
false |
patch |
[USN-6502-4], [CVE-2023-25775], [CVE-2023-31085], [CVE-2023-45871], [CVE-2023-5090], [CVE-2023-5345] |
USN-6502-4 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65023000000 |
false |
patch |
[USN-6502-3], [CVE-2023-25775], [CVE-2023-31085], [CVE-2023-45871], [CVE-2023-5090], [CVE-2023-5345] |
USN-6502-3 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:65021000000 |
false |
patch |
[USN-6502-1], [CVE-2023-25775], [CVE-2023-31085], [CVE-2023-45871], [CVE-2023-5090], [CVE-2023-5345] |
USN-6502-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:65011000000 |
false |
patch |
[USN-6501-1], [CVE-2023-46118] |
USN-6501-1 -- RabbitMQ vulnerability |
| oval:com.ubuntu.jammy:def:65001000000 |
false |
patch |
[USN-6500-1], [CVE-2023-46724], [CVE-2023-46728], [CVE-2023-46846], [CVE-2023-46847], [CVE-2023-46848] |
USN-6500-1 -- Squid vulnerabilities |
| oval:com.ubuntu.jammy:def:64991000000 |
false |
patch |
[USN-6499-1], [CVE-2023-5981] |
USN-6499-1 -- GnuTLS vulnerability |
| oval:com.ubuntu.jammy:def:64981000000 |
false |
patch |
[USN-6498-1], [CVE-2023-38406], [CVE-2023-38407], [CVE-2023-47234], [CVE-2023-47235] |
USN-6498-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:64971000000 |
false |
patch |
[USN-6497-1], [CVE-2023-5090], [CVE-2023-5178], [CVE-2023-5717] |
USN-6497-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:64962000000 |
false |
patch |
[USN-6496-2], [CVE-2023-25775], [CVE-2023-31085], [CVE-2023-45871] |
USN-6496-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64961000000 |
false |
patch |
[USN-6496-1], [CVE-2023-25775], [CVE-2023-31085], [CVE-2023-45871] |
USN-6496-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64931000000 |
false |
patch |
[USN-6493-1] |
USN-6493-1 -- hibagent update |
| oval:com.ubuntu.jammy:def:64921000000 |
false |
patch |
[USN-6492-1], [CVE-2021-34431], [CVE-2021-34434], [CVE-2021-41039], [CVE-2023-0809], [CVE-2023-28366], [CVE-2023-3592] |
USN-6492-1 -- Mosquitto vulnerabilities |
| oval:com.ubuntu.jammy:def:64911000000 |
false |
patch |
[USN-6491-1], [CVE-2022-32212], [CVE-2022-32213], [CVE-2022-32214], [CVE-2022-32215], [CVE-2022-35256], [CVE-2022-43548] |
USN-6491-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:64901000000 |
false |
patch |
[USN-6490-1], [CVE-2023-41983], [CVE-2023-42852] |
USN-6490-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:64891000000 |
false |
patch |
[USN-6489-1], [CVE-2023-1672] |
USN-6489-1 -- Tang vulnerability |
| oval:com.ubuntu.jammy:def:64881000000 |
false |
patch |
[USN-6488-1], [CVE-2023-41913] |
USN-6488-1 -- strongSwan vulnerability |
| oval:com.ubuntu.jammy:def:64871000000 |
false |
patch |
[USN-6487-1], [CVE-2023-38469], [CVE-2023-38470], [CVE-2023-38471], [CVE-2023-38472], [CVE-2023-38473] |
USN-6487-1 -- Avahi vulnerabilities |
| oval:com.ubuntu.jammy:def:64861000000 |
false |
patch |
[USN-6486-1], [CVE-2023-33461] |
USN-6486-1 -- iniParser vulnerability |
| oval:com.ubuntu.jammy:def:64851000000 |
false |
patch |
[USN-6485-1], [CVE-2023-23583] |
USN-6485-1 -- Intel Microcode vulnerability |
| oval:com.ubuntu.jammy:def:64831000000 |
false |
patch |
[USN-6483-1], [CVE-2021-33391] |
USN-6483-1 -- HTML Tidy vulnerability |
| oval:com.ubuntu.jammy:def:64811000000 |
false |
patch |
[USN-6481-1], [CVE-2023-46752], [CVE-2023-46753] |
USN-6481-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:64801000000 |
false |
patch |
[USN-6480-1], [CVE-2023-36049], [CVE-2023-36558] |
USN-6480-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:64791000000 |
false |
patch |
[USN-6479-1], [CVE-2023-42756], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6479-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:64781000000 |
false |
patch |
[USN-6478-1], [CVE-2023-46316] |
USN-6478-1 -- Traceroute vulnerability |
| oval:com.ubuntu.jammy:def:64771000000 |
false |
patch |
[USN-6477-1], [CVE-2023-4016] |
USN-6477-1 -- procps-ng vulnerability |
| oval:com.ubuntu.jammy:def:64761000000 |
false |
patch |
[USN-6476-1], [CVE-2023-46852], [CVE-2023-46853] |
USN-6476-1 -- Memcached vulnerabilities |
| oval:com.ubuntu.jammy:def:64741000000 |
false |
patch |
[USN-6474-1], [CVE-2022-23468], [CVE-2022-23477], [CVE-2022-23478], [CVE-2022-23479], [CVE-2022-23480], [CVE-2022-23481], [CVE-2022-23482], [CVE-2022-23483], [CVE-2022-23484], [CVE-2022-23493], [CVE-2022-23613], [CVE-2023-40184], [CVE-2023-42822] |
USN-6474-1 -- xrdp vulnerabilities |
| oval:com.ubuntu.jammy:def:64732000000 |
false |
patch |
[USN-6473-2], [CVE-2018-25091], [CVE-2023-43804], [CVE-2023-45803] |
USN-6473-2 -- pip vulnerabilities |
| oval:com.ubuntu.jammy:def:64731000000 |
false |
patch |
[USN-6473-1], [CVE-2018-25091], [CVE-2023-43804], [CVE-2023-45803] |
USN-6473-1 -- urllib3 vulnerabilities |
| oval:com.ubuntu.jammy:def:64721000000 |
false |
patch |
[USN-6472-1], [CVE-2020-35357] |
USN-6472-1 -- GNU Scientific Library vulnerability |
| oval:com.ubuntu.jammy:def:64711000000 |
false |
patch |
[USN-6471-1], [CVE-2022-33065] |
USN-6471-1 -- libsndfile vulnerability |
| oval:com.ubuntu.jammy:def:64701000000 |
false |
patch |
[USN-6470-1], [CVE-2023-40743] |
USN-6470-1 -- Axis vulnerability |
| oval:com.ubuntu.jammy:def:64681000000 |
false |
patch |
[USN-6468-1], [CVE-2023-5721], [CVE-2023-5732], [CVE-2023-5724], [CVE-2023-5725], [CVE-2023-5728], [CVE-2023-5730] |
USN-6468-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:64672000000 |
false |
patch |
[USN-6467-2], [CVE-2023-36054] |
USN-6467-2 -- Kerberos vulnerability |
| oval:com.ubuntu.jammy:def:64661000000 |
false |
patch |
[USN-6466-1], [CVE-2022-45886], [CVE-2022-45887], [CVE-2022-45919], [CVE-2022-48425], [CVE-2023-1206], [CVE-2023-20569], [CVE-2023-20588], [CVE-2023-21264], [CVE-2023-2156], [CVE-2023-31083], [CVE-2023-3212], [CVE-2023-34319], [CVE-2023-3772], [CVE-2023-38427], [CVE-2023-38430], [CVE-2023-38431], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-3867], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4132], [CVE-2023-4134], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4244], [CVE-2023-4273], [CVE-2023-42752], [CVE-2023-42753], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-44466], [CVE-2023-4569], [CVE-2023-4622], [CVE-2023-4623], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6466-1 -- Linux kernel (NVIDIA) vulnerabilities |
| oval:com.ubuntu.jammy:def:64653000000 |
false |
patch |
[USN-6465-3], [CVE-2023-31083], [CVE-2023-3772] |
USN-6465-3 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:64652000000 |
false |
patch |
[USN-6465-2], [CVE-2023-31083], [CVE-2023-3772] |
USN-6465-2 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:64651000000 |
false |
patch |
[USN-6465-1], [CVE-2023-31083], [CVE-2023-3772] |
USN-6465-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64641000000 |
false |
patch |
[USN-6464-1], [CVE-2023-31083], [CVE-2023-3772], [CVE-2023-38430], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-3867], [CVE-2023-4132], [CVE-2023-4134], [CVE-2023-44466] |
USN-6464-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64631000000 |
false |
patch |
[USN-6463-1], [CVE-2023-34058], [CVE-2023-34059] |
USN-6463-1 -- Open VM Tools vulnerabilities |
| oval:com.ubuntu.jammy:def:64611000000 |
false |
patch |
[USN-6461-1], [CVE-2023-31085], [CVE-2023-34324], [CVE-2023-39189], [CVE-2023-4244], [CVE-2023-42754], [CVE-2023-4921], [CVE-2023-5345] |
USN-6461-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:64591000000 |
false |
patch |
[USN-6459-1], [CVE-2023-22032], [CVE-2023-22059], [CVE-2023-22064], [CVE-2023-22066], [CVE-2023-22068], [CVE-2023-22070], [CVE-2023-22078], [CVE-2023-22079], [CVE-2023-22084], [CVE-2023-22092], [CVE-2023-22097], [CVE-2023-22103], [CVE-2023-22112], [CVE-2023-22114] |
USN-6459-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:64581000000 |
false |
patch |
[USN-6458-1], [CVE-2022-29500], [CVE-2022-29501], [CVE-2022-29502] |
USN-6458-1 -- Slurm vulnerabilities |
| oval:com.ubuntu.jammy:def:64571000000 |
false |
patch |
[USN-6457-1], [CVE-2022-0778], [CVE-2022-1292], [CVE-2022-2068], [CVE-2022-2097] |
USN-6457-1 -- Node.js vulnerabilities |
| oval:com.ubuntu.jammy:def:64551000000 |
false |
patch |
[USN-6455-1], [CVE-2023-42117], [CVE-2023-42119] |
USN-6455-1 -- Exim vulnerabilities |
| oval:com.ubuntu.jammy:def:64531000000 |
false |
patch |
[USN-6453-1], [CVE-2023-5367], [CVE-2023-5380] |
USN-6453-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:64521000000 |
false |
patch |
[USN-6452-1], [CVE-2023-3896], [CVE-2023-4733], [CVE-2023-4734], [CVE-2023-4735], [CVE-2023-4738], [CVE-2023-4750], [CVE-2023-4751], [CVE-2023-4752], [CVE-2023-4781], [CVE-2023-5344], [CVE-2023-5441], [CVE-2023-5535] |
USN-6452-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:64501000000 |
false |
patch |
[USN-6450-1], [CVE-2023-2975], [CVE-2023-3446], [CVE-2023-3817], [CVE-2023-5363] |
USN-6450-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:64481000000 |
false |
patch |
[USN-6448-1], [CVE-2023-32307] |
USN-6448-1 -- Sofia-SIP vulnerability |
| oval:com.ubuntu.jammy:def:64461000000 |
false |
patch |
[USN-6446-1], [CVE-2023-34319], [CVE-2023-4244], [CVE-2023-42752], [CVE-2023-42753], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-4622], [CVE-2023-4623], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6446-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64451000000 |
false |
patch |
[USN-6445-1], [CVE-2023-1206], [CVE-2023-20569], [CVE-2023-2156], [CVE-2023-3338], [CVE-2023-34319], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-4132], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4244], [CVE-2023-4273], [CVE-2023-42752], [CVE-2023-42753], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-44466], [CVE-2023-4622], [CVE-2023-4623], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6445-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:64442000000 |
false |
patch |
[USN-6444-2], [CVE-2023-34319], [CVE-2023-4244], [CVE-2023-42752], [CVE-2023-42753], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-4622], [CVE-2023-4623], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6444-2 -- Linux kernel (StarFive) vulnerabilities |
| oval:com.ubuntu.jammy:def:64441000000 |
false |
patch |
[USN-6444-1], [CVE-2023-34319], [CVE-2023-4244], [CVE-2023-42752], [CVE-2023-42753], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-4622], [CVE-2023-4623], [CVE-2023-4881], [CVE-2023-4921], [CVE-2023-5197] |
USN-6444-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64431000000 |
false |
patch |
[USN-6443-1], [CVE-2023-42752], [CVE-2023-42755], [CVE-2023-42756], [CVE-2023-4881], [CVE-2023-5197] |
USN-6443-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:64371000000 |
false |
patch |
[USN-6437-1], [CVE-2018-7998], [CVE-2019-6976], [CVE-2020-20739], [CVE-2021-27847], [CVE-2023-40032] |
USN-6437-1 -- VIPS vulnerabilities |
| oval:com.ubuntu.jammy:def:64361000000 |
false |
patch |
[USN-6436-1], [CVE-2023-41358], [CVE-2023-41360], [CVE-2023-41909] |
USN-6436-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:64341000000 |
false |
patch |
[USN-6434-1], [CVE-2023-41915] |
USN-6434-1 -- PMIx vulnerability |
| oval:com.ubuntu.jammy:def:64331000000 |
false |
patch |
[USN-6433-1], [CVE-2023-43115] |
USN-6433-1 -- Ghostscript vulnerability |
| oval:com.ubuntu.jammy:def:64313000000 |
false |
patch |
[USN-6431-3] |
USN-6431-3 -- iperf3 vulnerability |
| oval:com.ubuntu.jammy:def:64312000000 |
false |
patch |
[USN-6431-2], [CVE-2023-38403] |
USN-6431-2 -- iperf3 vulnerability |
| oval:com.ubuntu.jammy:def:64291000000 |
false |
patch |
[USN-6429-1], [CVE-2023-38545], [CVE-2023-38546] |
USN-6429-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:64281000000 |
false |
patch |
[USN-6428-1], [CVE-2023-1916] |
USN-6428-1 -- LibTIFF vulnerability |
| oval:com.ubuntu.jammy:def:64271000000 |
false |
patch |
[USN-6427-1], [CVE-2023-44487] |
USN-6427-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:64261000000 |
false |
patch |
[USN-6426-1], [CVE-2023-39928], [CVE-2023-41074], [CVE-2023-41993] |
USN-6426-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:64251000000 |
false |
patch |
[USN-6425-1], [CVE-2023-4091], [CVE-2023-4154], [CVE-2023-42669], [CVE-2023-42670] |
USN-6425-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:64231000000 |
false |
patch |
[USN-6423-1], [CVE-2023-43641] |
USN-6423-1 -- CUE vulnerability |
| oval:com.ubuntu.jammy:def:64201000000 |
false |
patch |
[USN-6420-1], [CVE-2022-3234], [CVE-2022-3235], [CVE-2022-3256], [CVE-2022-3278], [CVE-2022-3297], [CVE-2022-3324], [CVE-2022-3352], [CVE-2022-3491], [CVE-2022-3520], [CVE-2022-3591], [CVE-2022-3705], [CVE-2022-4292], [CVE-2022-4293] |
USN-6420-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:64163000000 |
false |
patch |
[USN-6416-3], [CVE-2023-1206], [CVE-2023-20569], [CVE-2023-2156], [CVE-2023-3338], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-4132], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4273], [CVE-2023-44466] |
USN-6416-3 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:64161000000 |
false |
patch |
[USN-6416-1], [CVE-2023-1206], [CVE-2023-20569], [CVE-2023-2156], [CVE-2023-3338], [CVE-2023-38432], [CVE-2023-3863], [CVE-2023-3865], [CVE-2023-3866], [CVE-2023-4132], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4273], [CVE-2023-44466] |
USN-6416-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64151000000 |
false |
patch |
[USN-6415-1], [CVE-2023-20569], [CVE-2023-25775], [CVE-2023-37453], [CVE-2023-3772], [CVE-2023-3773], [CVE-2023-42753], [CVE-2023-4622], [CVE-2023-4623] |
USN-6415-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:64141000000 |
false |
patch |
[USN-6414-1], [CVE-2023-43665] |
USN-6414-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:64121000000 |
false |
patch |
[USN-6412-1], [CVE-2022-45886], [CVE-2022-45887], [CVE-2022-45919], [CVE-2022-48425], [CVE-2023-1206], [CVE-2023-20569], [CVE-2023-2156], [CVE-2023-3212], [CVE-2023-38427], [CVE-2023-38431], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4273] |
USN-6412-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:64111000000 |
false |
patch |
[USN-6411-1], [CVE-2023-42114], [CVE-2023-42115], [CVE-2023-42116] |
USN-6411-1 -- Exim vulnerabilities |
| oval:com.ubuntu.jammy:def:64101000000 |
false |
patch |
[USN-6410-1], [CVE-2023-4692], [CVE-2023-4693] |
USN-6410-1 -- GRUB2 vulnerabilities |
| oval:com.ubuntu.jammy:def:64091000000 |
false |
patch |
[USN-6409-1], [CVE-2023-4527], [CVE-2023-4911] |
USN-6409-1 -- GNU C Library vulnerabilities |
| oval:com.ubuntu.jammy:def:64081000000 |
false |
patch |
[USN-6408-1], [CVE-2023-43786], [CVE-2023-43787], [CVE-2023-43788], [CVE-2023-43789] |
USN-6408-1 -- libXpm vulnerabilities |
| oval:com.ubuntu.jammy:def:64071000000 |
false |
patch |
[USN-6407-1], [CVE-2023-43785], [CVE-2023-43786], [CVE-2023-43787] |
USN-6407-1 -- libx11 vulnerabilities |
| oval:com.ubuntu.jammy:def:64061000000 |
false |
patch |
[USN-6406-1], [CVE-2023-4046] |
USN-6406-1 -- SpiderMonkey vulnerabilities |
| oval:com.ubuntu.jammy:def:64051000000 |
false |
patch |
[USN-6405-1], [CVE-2023-3600], [CVE-2023-4057], [CVE-2023-4577], [CVE-2023-4578], [CVE-2023-4580], [CVE-2023-4583], [CVE-2023-4585], [CVE-2023-5169], [CVE-2023-5171], [CVE-2023-5176], [CVE-2023-5217] |
USN-6405-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:64031000000 |
false |
patch |
[USN-6403-1], [CVE-2023-44488], [CVE-2023-5217] |
USN-6403-1 -- libvpx vulnerabilities |
| oval:com.ubuntu.jammy:def:64021000000 |
false |
patch |
[USN-6402-1], [CVE-2023-36328] |
USN-6402-1 -- LibTomMath vulnerability |
| oval:com.ubuntu.jammy:def:64011000000 |
false |
patch |
[USN-6401-1], [CVE-2023-39350], [CVE-2023-39351], [CVE-2023-39353], [CVE-2023-39354], [CVE-2023-40181], [CVE-2023-40186], [CVE-2023-40188], [CVE-2023-40567], [CVE-2023-40569], [CVE-2023-40589] |
USN-6401-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:63981000000 |
false |
patch |
[USN-6398-1], [CVE-2022-26505], [CVE-2023-33476] |
USN-6398-1 -- ReadyMedia vulnerabilities |
| oval:com.ubuntu.jammy:def:63911000000 |
false |
patch |
[USN-6391-1], [CVE-2023-4504] |
USN-6391-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:63901000000 |
false |
patch |
[USN-6390-1], [CVE-2023-3341], [CVE-2023-4236] |
USN-6390-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:63891000000 |
false |
patch |
[USN-6389-1], [CVE-2023-40305] |
USN-6389-1 -- Indent vulnerability |
| oval:com.ubuntu.jammy:def:63863000000 |
false |
patch |
[USN-6386-3], [CVE-2023-20588], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4569] |
USN-6386-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63862000000 |
false |
patch |
[USN-6386-2], [CVE-2023-20588], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4569] |
USN-6386-2 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:63861000000 |
false |
patch |
[USN-6386-1], [CVE-2023-20588], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4569] |
USN-6386-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63851000000 |
false |
patch |
[USN-6385-1], [CVE-2022-27672], [CVE-2022-4269], [CVE-2023-0458], [CVE-2023-1075], [CVE-2023-1076], [CVE-2023-1206], [CVE-2023-1380], [CVE-2023-1611], [CVE-2023-2002], [CVE-2023-20593], [CVE-2023-2162], [CVE-2023-2163], [CVE-2023-2235], [CVE-2023-2269], [CVE-2023-28328], [CVE-2023-28466], [CVE-2023-2898], [CVE-2023-3090], [CVE-2023-3141], [CVE-2023-31436], [CVE-2023-3220], [CVE-2023-32269], [CVE-2023-3390], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3863], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4194], [CVE-2023-4273], [CVE-2023-4569] |
USN-6385-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:63841000000 |
false |
patch |
[USN-6384-1], [CVE-2023-20588], [CVE-2023-4569] |
USN-6384-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:63831000000 |
false |
patch |
[USN-6383-1], [CVE-2023-20588], [CVE-2023-21264], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4569] |
USN-6383-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63781000000 |
false |
patch |
[USN-6378-1], [CVE-2023-41164] |
USN-6378-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:63751000000 |
false |
patch |
[USN-6375-1] |
USN-6375-1 -- atftp vulnerability |
| oval:com.ubuntu.jammy:def:63741000000 |
false |
patch |
[USN-6374-1], [CVE-2023-4874], [CVE-2023-4875] |
USN-6374-1 -- Mutt vulnerabilities |
| oval:com.ubuntu.jammy:def:63731000000 |
false |
patch |
[USN-6373-1], [CVE-2023-4156] |
USN-6373-1 -- gawk vulnerability |
| oval:com.ubuntu.jammy:def:63701000000 |
false |
patch |
[USN-6370-1], [CVE-2021-42717], [CVE-2022-48279], [CVE-2023-24021] |
USN-6370-1 -- ModSecurity vulnerabilities |
| oval:com.ubuntu.jammy:def:63691000000 |
false |
patch |
[USN-6369-1], [CVE-2023-4863] |
USN-6369-1 -- libwebp vulnerability |
| oval:com.ubuntu.jammy:def:63681000000 |
false |
patch |
[USN-6368-1], [CVE-2023-4573], [CVE-2023-4574], [CVE-2023-4575], [CVE-2023-4581], [CVE-2023-4584], [CVE-2023-4863] |
USN-6368-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:63651000000 |
false |
patch |
[USN-6365-1], [CVE-2023-20900] |
USN-6365-1 -- Open VM Tools vulnerability |
| oval:com.ubuntu.jammy:def:63622000000 |
false |
patch |
[USN-6362-2], [CVE-2023-36799] |
USN-6362-2 -- .Net regressions |
| oval:com.ubuntu.jammy:def:63621000000 |
false |
patch |
[USN-6362-1], [CVE-2023-36799] |
USN-6362-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:63611000000 |
false |
patch |
[USN-6361-1], [CVE-2023-32360] |
USN-6361-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:63601000000 |
false |
patch |
[USN-6360-1], [CVE-2020-22219] |
USN-6360-1 -- FLAC vulnerability |
| oval:com.ubuntu.jammy:def:63591000000 |
false |
patch |
[USN-6359-1], [CVE-2022-48554] |
USN-6359-1 -- file vulnerability |
| oval:com.ubuntu.jammy:def:63581000000 |
false |
patch |
[USN-6358-1], [CVE-2023-31606] |
USN-6358-1 -- RedCloth vulnerability |
| oval:com.ubuntu.jammy:def:63551000000 |
false |
patch |
[USN-6355-1], [CVE-2022-28737], [CVE-2021-3695], [CVE-2021-3696], [CVE-2021-3697], [CVE-2021-3981], [CVE-2022-28733], [CVE-2022-28734], [CVE-2022-28735], [CVE-2022-28736], [CVE-2022-3775] |
USN-6355-1 -- GRUB2 vulnerabilities |
| oval:com.ubuntu.jammy:def:63511000000 |
false |
patch |
[USN-6351-1], [CVE-2022-48425], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-3212], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6351-1 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:63501000000 |
false |
patch |
[USN-6350-1], [CVE-2022-48425], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-3212], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6350-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63481000000 |
false |
patch |
[USN-6348-1], [CVE-2022-40982], [CVE-2023-20593], [CVE-2023-21400], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6348-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63451000000 |
false |
patch |
[USN-6345-1], [CVE-2023-32627] |
USN-6345-1 -- SoX vulnerability |
| oval:com.ubuntu.jammy:def:63431000000 |
false |
patch |
[USN-6343-1], [CVE-2023-1206], [CVE-2023-34319], [CVE-2023-40283], [CVE-2023-4128], [CVE-2023-4155], [CVE-2023-4194], [CVE-2023-4273] |
USN-6343-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:63394000000 |
false |
patch |
[USN-6339-4], [CVE-2022-48425], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-3212], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6339-4 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:63393000000 |
false |
patch |
[USN-6339-3], [CVE-2022-48425], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-3212], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6339-3 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63391000000 |
false |
patch |
[USN-6339-1], [CVE-2022-48425], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-3212], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6339-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63382000000 |
false |
patch |
[USN-6338-2], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-32247], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-32258], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6338-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63381000000 |
false |
patch |
[USN-6338-1], [CVE-2023-21255], [CVE-2023-2898], [CVE-2023-31084], [CVE-2023-32247], [CVE-2023-32250], [CVE-2023-32252], [CVE-2023-32257], [CVE-2023-32258], [CVE-2023-38426], [CVE-2023-38428], [CVE-2023-38429] |
USN-6338-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63361000000 |
false |
patch |
[USN-6336-1], [CVE-2017-11468], [CVE-2023-2253] |
USN-6336-1 -- Docker Registry vulnerabilities |
| oval:com.ubuntu.jammy:def:63331000000 |
false |
patch |
[USN-6333-1], [CVE-2023-3417], [CVE-2023-4045], [CVE-2023-4046], [CVE-2023-4047], [CVE-2023-4048], [CVE-2023-4049], [CVE-2023-4050], [CVE-2023-4055], [CVE-2023-4056] |
USN-6333-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:63321000000 |
false |
patch |
[USN-6332-1], [CVE-2022-40982], [CVE-2022-4269], [CVE-2022-48502], [CVE-2023-0597], [CVE-2023-1611], [CVE-2023-1855], [CVE-2023-1990], [CVE-2023-2002], [CVE-2023-20593], [CVE-2023-2124], [CVE-2023-21400], [CVE-2023-2163], [CVE-2023-2194], [CVE-2023-2235], [CVE-2023-2269], [CVE-2023-23004], [CVE-2023-28466], [CVE-2023-30772], [CVE-2023-3141], [CVE-2023-32248], [CVE-2023-3268], [CVE-2023-33203], [CVE-2023-33288], [CVE-2023-35823], [CVE-2023-35824], [CVE-2023-35828], [CVE-2023-35829], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6332-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:63261000000 |
false |
patch |
[USN-6326-1], [CVE-2023-40267] |
USN-6326-1 -- GitPython vulnerability |
| oval:com.ubuntu.jammy:def:63251000000 |
false |
patch |
[USN-6325-1], [CVE-2022-40982], [CVE-2023-20593], [CVE-2023-21400], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6325-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63231000000 |
false |
patch |
[USN-6323-1], [CVE-2023-38802] |
USN-6323-1 -- FRR vulnerability |
| oval:com.ubuntu.jammy:def:63191000000 |
false |
patch |
[USN-6319-1], [CVE-2023-20569] |
USN-6319-1 -- AMD Microcode vulnerability |
| oval:com.ubuntu.jammy:def:63181000000 |
false |
patch |
[USN-6318-1], [CVE-2022-40982], [CVE-2023-20593], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6318-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63161000000 |
false |
patch |
[USN-6316-1], [CVE-2022-40982], [CVE-2023-20593], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6316-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:63151000000 |
false |
patch |
[USN-6315-1], [CVE-2022-40982], [CVE-2023-20593], [CVE-2023-21400], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-3777], [CVE-2023-3995], [CVE-2023-4004], [CVE-2023-4015] |
USN-6315-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63111000000 |
false |
patch |
[USN-6311-1], [CVE-2022-4269], [CVE-2022-48502], [CVE-2023-0597], [CVE-2023-1611], [CVE-2023-1855], [CVE-2023-1990], [CVE-2023-2002], [CVE-2023-2124], [CVE-2023-2163], [CVE-2023-2194], [CVE-2023-2235], [CVE-2023-2269], [CVE-2023-23004], [CVE-2023-28466], [CVE-2023-30772], [CVE-2023-3141], [CVE-2023-32248], [CVE-2023-3268], [CVE-2023-33203], [CVE-2023-33288], [CVE-2023-35823], [CVE-2023-35824], [CVE-2023-35828], [CVE-2023-35829] |
USN-6311-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:63101000000 |
false |
patch |
[USN-6310-1], [CVE-2021-32292] |
USN-6310-1 -- json-c vulnerability |
| oval:com.ubuntu.jammy:def:63081000000 |
false |
patch |
[USN-6308-1], [CVE-2023-39976] |
USN-6308-1 -- Libqb vulnerability |
| oval:com.ubuntu.jammy:def:63071000000 |
false |
patch |
[USN-6307-1], [CVE-2023-37464] |
USN-6307-1 -- JOSE for C/C++ vulnerability |
| oval:com.ubuntu.jammy:def:63061000000 |
false |
patch |
[USN-6306-1], [CVE-2021-38425], [CVE-2023-39534], [CVE-2023-39945], [CVE-2023-39946], [CVE-2023-39947], [CVE-2023-39948], [CVE-2023-39949] |
USN-6306-1 -- Fast DDS vulnerabilities |
| oval:com.ubuntu.jammy:def:63051000000 |
false |
patch |
[USN-6305-1], [CVE-2023-3823], [CVE-2023-3824] |
USN-6305-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:63041000000 |
false |
patch |
[USN-6304-1], [CVE-2022-39028], [CVE-2023-40303] |
USN-6304-1 -- Inetutils vulnerabilities |
| oval:com.ubuntu.jammy:def:63031000000 |
false |
patch |
[USN-6303-1], [CVE-2023-20197] |
USN-6303-1 -- ClamAV vulnerability |
| oval:com.ubuntu.jammy:def:63021000000 |
false |
patch |
[USN-6302-1], [CVE-2022-2522], [CVE-2022-2580], [CVE-2022-2598], [CVE-2022-2816], [CVE-2022-2817], [CVE-2022-2819], [CVE-2022-2862], [CVE-2022-2874], [CVE-2022-2889], [CVE-2022-2982], [CVE-2022-3016], [CVE-2022-3037], [CVE-2022-3099], [CVE-2022-3134], [CVE-2022-3153] |
USN-6302-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:63001000000 |
false |
patch |
[USN-6300-1], [CVE-2022-4269], [CVE-2022-48502], [CVE-2023-0597], [CVE-2023-1611], [CVE-2023-1855], [CVE-2023-1990], [CVE-2023-2002], [CVE-2023-2124], [CVE-2023-2163], [CVE-2023-2194], [CVE-2023-2235], [CVE-2023-2269], [CVE-2023-23004], [CVE-2023-28466], [CVE-2023-30772], [CVE-2023-3141], [CVE-2023-32248], [CVE-2023-3268], [CVE-2023-33203], [CVE-2023-33288], [CVE-2023-35823], [CVE-2023-35824], [CVE-2023-35828], [CVE-2023-35829] |
USN-6300-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:62971000000 |
false |
patch |
[USN-6297-1], [CVE-2023-38559] |
USN-6297-1 -- Ghostscript vulnerability |
| oval:com.ubuntu.jammy:def:62961000000 |
false |
patch |
[USN-6296-1], [CVE-2023-39417], [CVE-2023-39418] |
USN-6296-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:62951000000 |
false |
patch |
[USN-6295-1], [CVE-2022-2989] |
USN-6295-1 -- Podman vulnerability |
| oval:com.ubuntu.jammy:def:62941000000 |
false |
patch |
[USN-6294-1], [CVE-2023-40225] |
USN-6294-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:62931000000 |
false |
patch |
[USN-6293-1], [CVE-2023-1625] |
USN-6293-1 -- OpenStack Heat vulnerability |
| oval:com.ubuntu.jammy:def:62901000000 |
false |
patch |
[USN-6290-1], [CVE-2022-48281], [CVE-2023-25433], [CVE-2023-26965], [CVE-2023-26966], [CVE-2023-2731], [CVE-2023-2908], [CVE-2023-3316], [CVE-2023-3618], [CVE-2023-38288], [CVE-2023-38289] |
USN-6290-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:62891000000 |
false |
patch |
[USN-6289-1], [CVE-2023-38133], [CVE-2023-38572], [CVE-2023-38592], [CVE-2023-38594], [CVE-2023-38595], [CVE-2023-38597], [CVE-2023-38599], [CVE-2023-38600], [CVE-2023-38611] |
USN-6289-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:62881000000 |
false |
patch |
[USN-6288-1], [CVE-2023-22005], [CVE-2023-22008], [CVE-2023-22033], [CVE-2023-22038], [CVE-2023-22046], [CVE-2023-22048], [CVE-2023-22053], [CVE-2023-22054], [CVE-2023-22056], [CVE-2023-22057], [CVE-2023-22058] |
USN-6288-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:62861000000 |
false |
patch |
[USN-6286-1], [CVE-2022-40982], [CVE-2022-41804], [CVE-2023-23908] |
USN-6286-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:62851000000 |
false |
patch |
[USN-6285-1], [CVE-2022-48502], [CVE-2023-2640], [CVE-2023-2898], [CVE-2023-31248], [CVE-2023-32629], [CVE-2023-3390], [CVE-2023-35001], [CVE-2023-3609], [CVE-2023-3610], [CVE-2023-3611], [CVE-2023-3776], [CVE-2023-38430], [CVE-2023-38432], [CVE-2023-3863] |
USN-6285-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62801000000 |
false |
patch |
[USN-6280-1], [CVE-2023-36810] |
USN-6280-1 -- PyPDF2 vulnerability |
| oval:com.ubuntu.jammy:def:62782000000 |
false |
patch |
[USN-6278-2], [CVE-2023-35390], [CVE-2023-38178], [CVE-2023-38180] |
USN-6278-2 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:62772000000 |
false |
patch |
[USN-6277-2], [CVE-2021-3838], [CVE-2022-2400] |
USN-6277-2 -- Dompdf vulnerabilities |
| oval:com.ubuntu.jammy:def:62751000000 |
false |
patch |
[USN-6275-1], [CVE-2023-38497] |
USN-6275-1 -- Cargo vulnerability |
| oval:com.ubuntu.jammy:def:62731000000 |
false |
patch |
[USN-6273-1], [CVE-2022-27337], [CVE-2023-34872] |
USN-6273-1 -- poppler vulnerabilities |
| oval:com.ubuntu.jammy:def:62711000000 |
false |
patch |
[USN-6271-1], [CVE-2022-30256], [CVE-2023-31137] |
USN-6271-1 -- MaraDNS vulnerabilities |
| oval:com.ubuntu.jammy:def:62701000000 |
false |
patch |
[USN-6270-1], [CVE-2022-2182], [CVE-2022-2208], [CVE-2022-2210], [CVE-2022-2231], [CVE-2022-2257], [CVE-2022-2264], [CVE-2022-2284], [CVE-2022-2285], [CVE-2022-2286], [CVE-2022-2287], [CVE-2022-2289] |
USN-6270-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:62691000000 |
false |
patch |
[USN-6269-1], [CVE-2023-37327] |
USN-6269-1 -- GStreamer Good Plugins vulnerability |
| oval:com.ubuntu.jammy:def:62681000000 |
false |
patch |
[USN-6268-1], [CVE-2023-37327], [CVE-2023-37328] |
USN-6268-1 -- GStreamer Base Plugins vulnerabilities |
| oval:com.ubuntu.jammy:def:62661000000 |
false |
patch |
[USN-6266-1], [CVE-2023-38633] |
USN-6266-1 -- librsvg vulnerability |
| oval:com.ubuntu.jammy:def:62641000000 |
false |
patch |
[USN-6264-1], [CVE-2023-28204], [CVE-2023-32373], [CVE-2023-32393], [CVE-2023-32435], [CVE-2023-32439], [CVE-2023-37450] |
USN-6264-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:62632000000 |
false |
patch |
[USN-6263-2] |
USN-6263-2 -- OpenJDK regression |
| oval:com.ubuntu.jammy:def:62631000000 |
false |
patch |
[USN-6263-1], [CVE-2023-22006], [CVE-2023-22036], [CVE-2023-22041], [CVE-2023-22044], [CVE-2023-22045], [CVE-2023-22049], [CVE-2023-25193] |
USN-6263-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:62601000000 |
false |
patch |
[USN-6260-1], [CVE-2022-48502], [CVE-2023-2640], [CVE-2023-3090], [CVE-2023-31248], [CVE-2023-3141], [CVE-2023-32629], [CVE-2023-3389], [CVE-2023-3390], [CVE-2023-35001] |
USN-6260-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:62581000000 |
false |
patch |
[USN-6258-1], [CVE-2023-29932], [CVE-2023-29933], [CVE-2023-29934], [CVE-2023-29939] |
USN-6258-1 -- LLVM Toolchain vulnerabilities |
| oval:com.ubuntu.jammy:def:62571000000 |
false |
patch |
[USN-6257-1], [CVE-2023-20867] |
USN-6257-1 -- Open VM Tools vulnerability |
| oval:com.ubuntu.jammy:def:62491000000 |
false |
patch |
[USN-6249-1], [CVE-2023-3269], [CVE-2023-3389] |
USN-6249-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62481000000 |
false |
patch |
[USN-6248-1], [CVE-2022-47929], [CVE-2023-21106], [CVE-2023-2640], [CVE-2023-31248], [CVE-2023-32629], [CVE-2023-3389], [CVE-2023-35001] |
USN-6248-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62471000000 |
false |
patch |
[USN-6247-1], [CVE-2022-2663], [CVE-2022-3635], [CVE-2022-47929], [CVE-2023-2860], [CVE-2023-31248], [CVE-2023-35001] |
USN-6247-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62461000000 |
false |
patch |
[USN-6246-1], [CVE-2023-3090], [CVE-2023-31248], [CVE-2023-3389], [CVE-2023-3390], [CVE-2023-3439], [CVE-2023-35001] |
USN-6246-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:62451000000 |
false |
patch |
[USN-6245-1] |
USN-6245-1 -- Trove vulnerabilities |
| oval:com.ubuntu.jammy:def:62441000000 |
false |
patch |
[USN-6244-1], [CVE-2023-20593] |
USN-6244-1 -- AMD Microcode vulnerability |
| oval:com.ubuntu.jammy:def:62431000000 |
false |
patch |
[USN-6243-1], [CVE-2017-18638], [CVE-2022-4728], [CVE-2022-4729], [CVE-2022-4730] |
USN-6243-1 -- Graphite-Web vulnerabilities |
| oval:com.ubuntu.jammy:def:62421000000 |
false |
patch |
[USN-6242-1], [CVE-2023-38408] |
USN-6242-1 -- OpenSSH vulnerability |
| oval:com.ubuntu.jammy:def:62411000000 |
false |
patch |
[USN-6241-1], [CVE-2023-2088] |
USN-6241-1 -- OpenStack vulnerability |
| oval:com.ubuntu.jammy:def:62391000000 |
false |
patch |
[USN-6239-1], [CVE-2022-24884] |
USN-6239-1 -- ECDSA Util vulnerability |
| oval:com.ubuntu.jammy:def:62381000000 |
false |
patch |
[USN-6238-1], [CVE-2022-2127], [CVE-2023-3347], [CVE-2023-34966], [CVE-2023-34967], [CVE-2023-34968] |
USN-6238-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:62372000000 |
false |
patch |
[USN-6237-2] |
USN-6237-2 -- curl regression |
| oval:com.ubuntu.jammy:def:62371000000 |
false |
patch |
[USN-6237-1], [CVE-2023-28321], [CVE-2023-28322], [CVE-2023-32001] |
USN-6237-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:62361000000 |
false |
patch |
[USN-6236-1], [CVE-2021-26675], [CVE-2021-26676], [CVE-2021-33833], [CVE-2022-23096], [CVE-2022-23097], [CVE-2022-23098], [CVE-2022-32292], [CVE-2022-32293], [CVE-2023-28488] |
USN-6236-1 -- ConnMan vulnerabilities |
| oval:com.ubuntu.jammy:def:62351000000 |
false |
patch |
[USN-6235-1], [CVE-2022-4842], [CVE-2023-0459], [CVE-2023-0597], [CVE-2023-1073], [CVE-2023-2124], [CVE-2023-2176], [CVE-2023-2430], [CVE-2023-35788] |
USN-6235-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62332000000 |
false |
patch |
[USN-6233-2], [CVE-2017-16516], [CVE-2022-24795], [CVE-2023-33460] |
USN-6233-2 -- YAJL vulnerabilities |
| oval:com.ubuntu.jammy:def:62311000000 |
false |
patch |
[USN-6231-1], [CVE-2023-2124], [CVE-2023-3090], [CVE-2023-31084], [CVE-2023-3141], [CVE-2023-3212] |
USN-6231-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62271000000 |
false |
patch |
[USN-6227-1], [CVE-2023-37202], [CVE-2023-37211] |
USN-6227-1 -- SpiderMonkey vulnerabilities |
| oval:com.ubuntu.jammy:def:62261000000 |
false |
patch |
[USN-6226-1], [CVE-2023-25399], [CVE-2023-29824] |
USN-6226-1 -- SciPy vulnerabilities |
| oval:com.ubuntu.jammy:def:62251000000 |
false |
patch |
[USN-6225-1], [CVE-2022-40188] |
USN-6225-1 -- Knot Resolver vulnerability |
| oval:com.ubuntu.jammy:def:62231000000 |
false |
patch |
[USN-6223-1], [CVE-2023-1076], [CVE-2023-1077], [CVE-2023-1079], [CVE-2023-1670], [CVE-2023-1859], [CVE-2023-1998], [CVE-2023-25012], [CVE-2023-2985], [CVE-2023-35788] |
USN-6223-1 -- Linux kernel (Azure CVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62191000000 |
false |
patch |
[USN-6219-1], [CVE-2023-28755], [CVE-2023-36617] |
USN-6219-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:62171000000 |
false |
patch |
[USN-6217-1], [CVE-2023-33170] |
USN-6217-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:62141000000 |
false |
patch |
[USN-6214-1], [CVE-2023-34414], [CVE-2023-34416], [CVE-2023-37201], [CVE-2023-37202], [CVE-2023-37207], [CVE-2023-37208], [CVE-2023-37211] |
USN-6214-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:62131000000 |
false |
patch |
[USN-6213-1], [CVE-2023-36664] |
USN-6213-1 -- Ghostscript vulnerability |
| oval:com.ubuntu.jammy:def:62121000000 |
false |
patch |
[USN-6212-1], [CVE-2023-35788] |
USN-6212-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:62101000000 |
false |
patch |
[USN-6210-1], [CVE-2023-34246] |
USN-6210-1 -- Doorkeeper vulnerability |
| oval:com.ubuntu.jammy:def:62091000000 |
false |
patch |
[USN-6209-1], [CVE-2021-40391], [CVE-2021-40393], [CVE-2021-40394], [CVE-2021-40400], [CVE-2021-40401], [CVE-2021-40403] |
USN-6209-1 -- Gerbv vulnerabilities |
| oval:com.ubuntu.jammy:def:62071000000 |
false |
patch |
[USN-6207-1], [CVE-2023-1076], [CVE-2023-1077], [CVE-2023-1079], [CVE-2023-1670], [CVE-2023-1859], [CVE-2023-1998], [CVE-2023-25012], [CVE-2023-2985] |
USN-6207-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:62061000000 |
false |
patch |
[USN-6206-1], [CVE-2022-4842], [CVE-2023-0597], [CVE-2023-2124], [CVE-2023-35788] |
USN-6206-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:62041000000 |
false |
patch |
[USN-6204-1], [CVE-2023-34095] |
USN-6204-1 -- CPDB vulnerability |
| oval:com.ubuntu.jammy:def:62031000000 |
false |
patch |
[USN-6203-1], [CVE-2023-36053] |
USN-6203-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:62021000000 |
false |
patch |
[USN-6202-1], [CVE-2023-25153], [CVE-2023-25173] |
USN-6202-1 -- containerd vulnerabilities |
| oval:com.ubuntu.jammy:def:62002000000 |
false |
patch |
[USN-6200-2], [CVE-2023-1289], [CVE-2023-34151] |
USN-6200-2 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:62001000000 |
false |
patch |
[USN-6200-1], [CVE-2020-29599], [CVE-2021-20224], [CVE-2021-20241], [CVE-2021-20243], [CVE-2021-20244], [CVE-2021-20246], [CVE-2021-20309], [CVE-2021-20312], [CVE-2021-20313], [CVE-2021-3610], [CVE-2021-39212], [CVE-2022-28463], [CVE-2022-32545], [CVE-2022-32546], [CVE-2022-32547], [CVE-2023-1289], [CVE-2023-1906], [CVE-2023-3195], [CVE-2023-34151], [CVE-2023-3428] |
USN-6200-1 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:61991000000 |
false |
patch |
[USN-6199-1], [CVE-2023-3247] |
USN-6199-1 -- PHP vulnerability |
| oval:com.ubuntu.jammy:def:61961000000 |
false |
patch |
[USN-6196-1], [CVE-2023-33733] |
USN-6196-1 -- ReportLab vulnerability |
| oval:com.ubuntu.jammy:def:61951000000 |
false |
patch |
[USN-6195-1], [CVE-2022-0128], [CVE-2022-0156], [CVE-2022-0158], [CVE-2022-0393], [CVE-2022-0407], [CVE-2022-0696] |
USN-6195-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:61941000000 |
false |
patch |
[USN-6194-1], [CVE-2023-2176], [CVE-2023-2430], [CVE-2023-35788] |
USN-6194-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61931000000 |
false |
patch |
[USN-6193-1], [CVE-2023-35788] |
USN-6193-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61921000000 |
false |
patch |
[USN-6192-1], [CVE-2023-2430], [CVE-2023-35788] |
USN-6192-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61901000000 |
false |
patch |
[USN-6190-1], [CVE-2023-3297] |
USN-6190-1 -- AccountsService vulnerability |
| oval:com.ubuntu.jammy:def:61891000000 |
false |
patch |
[USN-6189-1], [CVE-2021-28235] |
USN-6189-1 -- etcd vulnerability |
| oval:com.ubuntu.jammy:def:61841000000 |
false |
patch |
[USN-6184-1], [CVE-2023-34241] |
USN-6184-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:61831000000 |
false |
patch |
[USN-6183-1], [CVE-2023-2828], [CVE-2023-2911] |
USN-6183-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:61801000000 |
false |
patch |
[USN-6180-1], [CVE-2019-19721], [CVE-2020-13428], [CVE-2021-25801], [CVE-2021-25802], [CVE-2021-25803], [CVE-2021-25804], [CVE-2022-41325] |
USN-6180-1 -- VLC media player vulnerabilities |
| oval:com.ubuntu.jammy:def:61791000000 |
false |
patch |
[USN-6179-1], [CVE-2023-1436] |
USN-6179-1 -- Jettison vulnerability |
| oval:com.ubuntu.jammy:def:61781000000 |
false |
patch |
[USN-6178-1], [CVE-2019-6246], [CVE-2021-44960] |
USN-6178-1 -- SVG++ library vulnerabilities |
| oval:com.ubuntu.jammy:def:61771000000 |
false |
patch |
[USN-6177-1], [CVE-2022-40149], [CVE-2022-40150], [CVE-2022-45685], [CVE-2022-45693] |
USN-6177-1 -- Jettison vulnerabilities |
| oval:com.ubuntu.jammy:def:61761000000 |
false |
patch |
[USN-6176-1], [CVE-2022-24859] |
USN-6176-1 -- PyPDF2 vulnerability |
| oval:com.ubuntu.jammy:def:61741000000 |
false |
patch |
[USN-6174-1], [CVE-2023-0459], [CVE-2023-1073], [CVE-2023-26606] |
USN-6174-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61731000000 |
false |
patch |
[USN-6173-1], [CVE-2023-1380], [CVE-2023-2002], [CVE-2023-2156], [CVE-2023-2269], [CVE-2023-31436], [CVE-2023-32250], [CVE-2023-32254] |
USN-6173-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61721000000 |
false |
patch |
[USN-6172-1], [CVE-2023-1076], [CVE-2023-1077], [CVE-2023-1079], [CVE-2023-1670], [CVE-2023-1859], [CVE-2023-1998], [CVE-2023-25012], [CVE-2023-2985] |
USN-6172-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61711000000 |
false |
patch |
[USN-6171-1], [CVE-2022-4269], [CVE-2023-1076], [CVE-2023-1077], [CVE-2023-1079], [CVE-2023-1670], [CVE-2023-1859], [CVE-2023-1998], [CVE-2023-25012], [CVE-2023-2985] |
USN-6171-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61701000000 |
false |
patch |
[USN-6170-1] |
USN-6170-1 -- Podman vulnerabilities |
| oval:com.ubuntu.jammy:def:61691000000 |
false |
patch |
[USN-6169-1], [CVE-2022-2469] |
USN-6169-1 -- GNU SASL vulnerability |
| oval:com.ubuntu.jammy:def:61681000000 |
false |
patch |
[USN-6168-1], [CVE-2023-3138] |
USN-6168-1 -- libx11 vulnerability |
| oval:com.ubuntu.jammy:def:61671000000 |
false |
patch |
[USN-6167-1], [CVE-2022-1050], [CVE-2022-4144], [CVE-2022-4172], [CVE-2023-0330] |
USN-6167-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:61661000000 |
false |
patch |
[USN-6166-1], [CVE-2023-2602], [CVE-2023-2603] |
USN-6166-1 -- libcap2 vulnerabilities |
| oval:com.ubuntu.jammy:def:61651000000 |
false |
patch |
[USN-6165-1], [CVE-2023-24593], [CVE-2023-25180], [CVE-2023-29499], [CVE-2023-32611], [CVE-2023-32636], [CVE-2023-32643], [CVE-2023-32665] |
USN-6165-1 -- GLib vulnerabilities |
| oval:com.ubuntu.jammy:def:61641000000 |
false |
patch |
[USN-6164-1], [CVE-2023-31130], [CVE-2023-32067] |
USN-6164-1 -- c-ares vulnerabilities |
| oval:com.ubuntu.jammy:def:61631000000 |
false |
patch |
[USN-6163-1], [CVE-2021-20307], [CVE-2021-33293] |
USN-6163-1 -- pano13 vulnerabilities |
| oval:com.ubuntu.jammy:def:61612000000 |
false |
patch |
[USN-6161-2] |
USN-6161-2 -- .NET regression |
| oval:com.ubuntu.jammy:def:61611000000 |
false |
patch |
[USN-6161-1], [CVE-2023-24936], [CVE-2023-29331], [CVE-2023-29337], [CVE-2023-32032], [CVE-2023-33128] |
USN-6161-1 -- .NET vulnerabilities |
| oval:com.ubuntu.jammy:def:61571000000 |
false |
patch |
[USN-6157-1], [CVE-2023-26253] |
USN-6157-1 -- GlusterFS vulnerability |
| oval:com.ubuntu.jammy:def:61551000000 |
false |
patch |
[USN-6155-1], [CVE-2023-32681] |
USN-6155-1 -- Requests vulnerability |
| oval:com.ubuntu.jammy:def:61541000000 |
false |
patch |
[USN-6154-1], [CVE-2023-2426], [CVE-2023-2609], [CVE-2023-2610] |
USN-6154-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:61531000000 |
false |
patch |
[USN-6153-1], [CVE-2022-39286] |
USN-6153-1 -- Jupyter Core vulnerability |
| oval:com.ubuntu.jammy:def:61521000000 |
false |
patch |
[USN-6152-1] |
USN-6152-1 -- Linux kernel (GKE) regression |
| oval:com.ubuntu.jammy:def:61501000000 |
false |
patch |
[USN-6150-1], [CVE-2023-1380], [CVE-2023-2612], [CVE-2023-30456], [CVE-2023-31436], [CVE-2023-32233] |
USN-6150-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61481000000 |
false |
patch |
[USN-6148-1], [CVE-2023-25076] |
USN-6148-1 -- SNI Proxy vulnerability |
| oval:com.ubuntu.jammy:def:61471000000 |
false |
patch |
[USN-6147-1], [CVE-2023-34416] |
USN-6147-1 -- SpiderMonkey vulnerability |
| oval:com.ubuntu.jammy:def:61461000000 |
false |
patch |
[USN-6146-1], [CVE-2021-31439], [CVE-2022-0194], [CVE-2022-23121], [CVE-2022-23122], [CVE-2022-23123], [CVE-2022-23124], [CVE-2022-23125], [CVE-2022-43634], [CVE-2022-45188] |
USN-6146-1 -- Netatalk vulnerabilities |
| oval:com.ubuntu.jammy:def:61451000000 |
false |
patch |
[USN-6145-1], [CVE-2022-39377], [CVE-2023-33204] |
USN-6145-1 -- Sysstat vulnerabilities |
| oval:com.ubuntu.jammy:def:61441000000 |
false |
patch |
[USN-6144-1], [CVE-2023-0950], [CVE-2023-2255] |
USN-6144-1 -- LibreOffice vulnerabilities |
| oval:com.ubuntu.jammy:def:61411000000 |
false |
patch |
[USN-6141-1], [CVE-2022-45062] |
USN-6141-1 -- xfce4-settings vulnerability |
| oval:com.ubuntu.jammy:def:61391000000 |
false |
patch |
[USN-6139-1], [CVE-2023-24329] |
USN-6139-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:61381000000 |
false |
patch |
[USN-6138-1], [CVE-2023-1667], [CVE-2023-2283] |
USN-6138-1 -- libssh vulnerabilities |
| oval:com.ubuntu.jammy:def:61371000000 |
false |
patch |
[USN-6137-1], [CVE-2021-32142], [CVE-2023-1729] |
USN-6137-1 -- LibRaw vulnerabilities |
| oval:com.ubuntu.jammy:def:61361000000 |
false |
patch |
[USN-6136-1], [CVE-2023-31489], [CVE-2023-31490] |
USN-6136-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:61351000000 |
false |
patch |
[USN-6135-1], [CVE-2023-1380], [CVE-2023-2612], [CVE-2023-30456], [CVE-2023-31436], [CVE-2023-32233] |
USN-6135-1 -- Linux kernel (Azure CVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61331000000 |
false |
patch |
[USN-6133-1], [CVE-2022-27672], [CVE-2022-3707], [CVE-2023-0459], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-1829], [CVE-2023-1872], [CVE-2023-20938], [CVE-2023-2162], [CVE-2023-32269] |
USN-6133-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:61291000000 |
false |
patch |
[USN-6129-1], [CVE-2023-1981] |
USN-6129-1 -- Avahi vulnerability |
| oval:com.ubuntu.jammy:def:61281000000 |
false |
patch |
[USN-6128-1], [CVE-2023-32324] |
USN-6128-1 -- CUPS vulnerability |
| oval:com.ubuntu.jammy:def:61271000000 |
false |
patch |
[USN-6127-1], [CVE-2023-1380], [CVE-2023-2612], [CVE-2023-30456], [CVE-2023-31436], [CVE-2023-32233] |
USN-6127-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:61261000000 |
false |
patch |
[USN-6126-1], [CVE-2022-0897], [CVE-2023-2700] |
USN-6126-1 -- libvirt vulnerabilities |
| oval:com.ubuntu.jammy:def:61251000000 |
false |
patch |
[USN-6125-1], [CVE-2023-1523] |
USN-6125-1 -- snapd vulnerability |
| oval:com.ubuntu.jammy:def:61241000000 |
false |
patch |
[USN-6124-1], [CVE-2022-3586], [CVE-2022-4139], [CVE-2023-1670], [CVE-2023-2612], [CVE-2023-30456], [CVE-2023-32233] |
USN-6124-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61231000000 |
false |
patch |
[USN-6123-1], [CVE-2023-1670], [CVE-2023-2612], [CVE-2023-26606], [CVE-2023-30456], [CVE-2023-32233] |
USN-6123-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61221000000 |
false |
patch |
[USN-6122-1], [CVE-2023-2612], [CVE-2023-32233] |
USN-6122-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:61201000000 |
false |
patch |
[USN-6120-1], [CVE-2023-25735], [CVE-2023-25739], [CVE-2023-25751], [CVE-2023-29535], [CVE-2023-29536], [CVE-2023-29548], [CVE-2023-29550], [CVE-2023-32211], [CVE-2023-32215] |
USN-6120-1 -- SpiderMonkey vulnerabilities |
| oval:com.ubuntu.jammy:def:61191000000 |
false |
patch |
[USN-6119-1], [CVE-2023-1255], [CVE-2023-2650] |
USN-6119-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:61171000000 |
false |
patch |
[USN-6117-1], [CVE-2019-17566], [CVE-2020-11987], [CVE-2022-38398], [CVE-2022-38648], [CVE-2022-40146], [CVE-2022-41704], [CVE-2022-42890] |
USN-6117-1 -- Apache Batik vulnerabilities |
| oval:com.ubuntu.jammy:def:61161000000 |
false |
patch |
[USN-6116-1], [CVE-2022-29167] |
USN-6116-1 -- hawk vulnerability |
| oval:com.ubuntu.jammy:def:61151000000 |
false |
patch |
[USN-6115-1], [CVE-2023-32700] |
USN-6115-1 -- TeX Live vulnerability |
| oval:com.ubuntu.jammy:def:61122000000 |
false |
patch |
[USN-6112-2], [CVE-2023-31484] |
USN-6112-2 -- Perl vulnerability |
| oval:com.ubuntu.jammy:def:61111000000 |
false |
patch |
[USN-6111-1], [CVE-2023-30861] |
USN-6111-1 -- Flask vulnerability |
| oval:com.ubuntu.jammy:def:61101000000 |
false |
patch |
[USN-6110-1], [CVE-2021-28275], [CVE-2021-28277], [CVE-2021-3496] |
USN-6110-1 -- Jhead vulnerabilities |
| oval:com.ubuntu.jammy:def:61081000000 |
false |
patch |
[USN-6108-1], [CVE-2021-34055], [CVE-2022-41751] |
USN-6108-1 -- Jhead vulnerabilities |
| oval:com.ubuntu.jammy:def:61061000000 |
false |
patch |
[USN-6106-1] |
USN-6106-1 -- calamares-settings-ubuntu vulnerability |
| oval:com.ubuntu.jammy:def:61051000000 |
false |
patch |
[USN-6105-1] |
USN-6105-1 -- ca-certificates update |
| oval:com.ubuntu.jammy:def:61041000000 |
false |
patch |
[USN-6104-1], [CVE-2023-2454], [CVE-2023-2455] |
USN-6104-1 -- PostgreSQL vulnerabilities |
| oval:com.ubuntu.jammy:def:61021000000 |
false |
patch |
[USN-6102-1], [CVE-2021-21366], [CVE-2022-37616], [CVE-2022-39353] |
USN-6102-1 -- xmldom vulnerabilities |
| oval:com.ubuntu.jammy:def:61011000000 |
false |
patch |
[USN-6101-1], [CVE-2023-1579], [CVE-2023-1972], [CVE-2023-25584], [CVE-2023-25585], [CVE-2023-25588] |
USN-6101-1 -- GNU binutils vulnerabilities |
| oval:com.ubuntu.jammy:def:61001000000 |
false |
patch |
[USN-6100-1], [CVE-2023-24038] |
USN-6100-1 -- HTML::StripScripts vulnerability |
| oval:com.ubuntu.jammy:def:60991000000 |
false |
patch |
[USN-6099-1], [CVE-2019-17594], [CVE-2019-17595], [CVE-2021-39537], [CVE-2022-29458], [CVE-2023-29491] |
USN-6099-1 -- ncurses vulnerabilities |
| oval:com.ubuntu.jammy:def:60961000000 |
false |
patch |
[USN-6096-1], [CVE-2022-27672], [CVE-2022-36280], [CVE-2022-3707], [CVE-2022-4129], [CVE-2022-4842], [CVE-2022-48423], [CVE-2022-48424], [CVE-2023-0210], [CVE-2023-0394], [CVE-2023-0458], [CVE-2023-0459], [CVE-2023-1073], [CVE-2023-1074], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-1652], [CVE-2023-21102], [CVE-2023-21106], [CVE-2023-2162], [CVE-2023-23454], [CVE-2023-23455], [CVE-2023-26544], [CVE-2023-32269] |
USN-6096-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60901000000 |
false |
patch |
[USN-6090-1], [CVE-2022-27672], [CVE-2022-3707], [CVE-2023-0459], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-20938], [CVE-2023-2162], [CVE-2023-32269] |
USN-6090-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60891000000 |
false |
patch |
[USN-6089-1], [CVE-2022-4139] |
USN-6089-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:60881000000 |
false |
patch |
[USN-6088-1], [CVE-2023-25809], [CVE-2023-27561], [CVE-2023-28642] |
USN-6088-1 -- runC vulnerabilities |
| oval:com.ubuntu.jammy:def:60851000000 |
false |
patch |
[USN-6085-1], [CVE-2022-27672], [CVE-2022-3707], [CVE-2023-0459], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-20938], [CVE-2023-2162], [CVE-2023-32269] |
USN-6085-1 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:60831000000 |
false |
patch |
[USN-6083-1], [CVE-2023-24805] |
USN-6083-1 -- cups-filters vulnerability |
| oval:com.ubuntu.jammy:def:60821000000 |
false |
patch |
[USN-6082-1], [CVE-2022-1650] |
USN-6082-1 -- EventSource vulnerability |
| oval:com.ubuntu.jammy:def:60801000000 |
false |
patch |
[USN-6080-1], [CVE-2022-27672], [CVE-2022-3707], [CVE-2023-0459], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-20938], [CVE-2023-2162], [CVE-2023-32269] |
USN-6080-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60791000000 |
false |
patch |
[USN-6079-1], [CVE-2022-27672], [CVE-2022-36280], [CVE-2022-3707], [CVE-2022-4129], [CVE-2022-4842], [CVE-2022-48423], [CVE-2022-48424], [CVE-2023-0210], [CVE-2023-0394], [CVE-2023-0458], [CVE-2023-0459], [CVE-2023-1073], [CVE-2023-1074], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1118], [CVE-2023-1513], [CVE-2023-1652], [CVE-2023-21102], [CVE-2023-21106], [CVE-2023-2162], [CVE-2023-23454], [CVE-2023-23455], [CVE-2023-26544], [CVE-2023-32269] |
USN-6079-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60781000000 |
false |
patch |
[USN-6078-1], [CVE-2023-1999] |
USN-6078-1 -- libwebp vulnerability |
| oval:com.ubuntu.jammy:def:60771000000 |
false |
patch |
[USN-6077-1], [CVE-2023-21930], [CVE-2023-21937], [CVE-2023-21938], [CVE-2023-21939], [CVE-2023-21954], [CVE-2023-21967], [CVE-2023-21968] |
USN-6077-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:60751000000 |
false |
patch |
[USN-6075-1], [CVE-2023-32205], [CVE-2023-32206], [CVE-2023-32207], [CVE-2023-32211], [CVE-2023-32212], [CVE-2023-32213], [CVE-2023-32215] |
USN-6075-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:60739000000 |
false |
patch |
[USN-6073-9] |
USN-6073-9 -- os-brick regression |
| oval:com.ubuntu.jammy:def:60738000000 |
false |
patch |
[USN-6073-8] |
USN-6073-8 -- Nova regression |
| oval:com.ubuntu.jammy:def:60737000000 |
false |
patch |
[USN-6073-7] |
USN-6073-7 -- Glance_store regression |
| oval:com.ubuntu.jammy:def:60736000000 |
false |
patch |
[USN-6073-6] |
USN-6073-6 -- Cinder regression |
| oval:com.ubuntu.jammy:def:60734000000 |
false |
patch |
[USN-6073-4], [CVE-2023-2088] |
USN-6073-4 -- os-brick vulnerability |
| oval:com.ubuntu.jammy:def:60733000000 |
false |
patch |
[USN-6073-3], [CVE-2023-2088] |
USN-6073-3 -- Nova vulnerability |
| oval:com.ubuntu.jammy:def:60732000000 |
false |
patch |
[USN-6073-2], [CVE-2023-2088] |
USN-6073-2 -- Glance_store vulnerability |
| oval:com.ubuntu.jammy:def:60731000000 |
false |
patch |
[USN-6073-1], [CVE-2023-2088] |
USN-6073-1 -- Cinder vulnerability |
| oval:com.ubuntu.jammy:def:60721000000 |
false |
patch |
[USN-6072-1], [CVE-2023-0386], [CVE-2023-0468], [CVE-2023-1829], [CVE-2023-1859], [CVE-2023-23455], [CVE-2023-26545] |
USN-6072-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:60711000000 |
false |
patch |
[USN-6071-1], [CVE-2022-2590], [CVE-2022-3303], [CVE-2022-3586], [CVE-2022-40307], [CVE-2022-4095], [CVE-2022-4662], [CVE-2023-0386], [CVE-2023-0468], [CVE-2023-1829], [CVE-2023-1859], [CVE-2023-23455], [CVE-2023-26545] |
USN-6071-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:60701000000 |
false |
patch |
[USN-6070-1], [CVE-2023-1829], [CVE-2023-1872] |
USN-6070-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60681000000 |
false |
patch |
[USN-6068-1], [CVE-2023-1668] |
USN-6068-1 -- Open vSwitch vulnerability |
| oval:com.ubuntu.jammy:def:60671000000 |
false |
patch |
[USN-6067-1], [CVE-2021-20267], [CVE-2021-38598], [CVE-2021-40085], [CVE-2021-40797], [CVE-2022-3277] |
USN-6067-1 -- OpenStack Neutron vulnerabilities |
| oval:com.ubuntu.jammy:def:60641000000 |
false |
patch |
[USN-6064-1], [CVE-2023-30608] |
USN-6064-1 -- SQL parse vulnerability |
| oval:com.ubuntu.jammy:def:60631000000 |
false |
patch |
[USN-6063-1], [CVE-2021-3979], [CVE-2022-0670], [CVE-2022-3650], [CVE-2022-3854] |
USN-6063-1 -- Ceph vulnerabilities |
| oval:com.ubuntu.jammy:def:60621000000 |
false |
patch |
[USN-6062-1], [CVE-2023-2004] |
USN-6062-1 -- FreeType vulnerability |
| oval:com.ubuntu.jammy:def:60611000000 |
false |
patch |
[USN-6061-1], [CVE-2022-0108], [CVE-2022-32885], [CVE-2023-25358], [CVE-2023-27932], [CVE-2023-27954], [CVE-2023-28205] |
USN-6061-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:60603000000 |
false |
patch |
[USN-6060-3] |
USN-6060-3 -- MySQL regression |
| oval:com.ubuntu.jammy:def:60601000000 |
false |
patch |
[USN-6060-1], [CVE-2023-21911], [CVE-2023-21912], [CVE-2023-21919], [CVE-2023-21920], [CVE-2023-21929], [CVE-2023-21933], [CVE-2023-21935], [CVE-2023-21940], [CVE-2023-21945], [CVE-2023-21946], [CVE-2023-21947], [CVE-2023-21953], [CVE-2023-21955], [CVE-2023-21962], [CVE-2023-21966], [CVE-2023-21972], [CVE-2023-21976], [CVE-2023-21977], [CVE-2023-21980], [CVE-2023-21982] |
USN-6060-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:60591000000 |
false |
patch |
[USN-6059-1], [CVE-2022-37026] |
USN-6059-1 -- Erlang vulnerability |
| oval:com.ubuntu.jammy:def:60571000000 |
false |
patch |
[USN-6057-1], [CVE-2022-4129], [CVE-2022-47929], [CVE-2022-4842], [CVE-2023-0386], [CVE-2023-0394], [CVE-2023-1073], [CVE-2023-1074], [CVE-2023-1281], [CVE-2023-1652], [CVE-2023-26545] |
USN-6057-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:60561000000 |
false |
patch |
[USN-6056-1], [CVE-2023-1859] |
USN-6056-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:60541000000 |
false |
patch |
[USN-6054-1], [CVE-2023-31047] |
USN-6054-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:60511000000 |
false |
patch |
[USN-6051-1], [CVE-2023-1829], [CVE-2023-1872] |
USN-6051-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60501000000 |
false |
patch |
[USN-6050-1], [CVE-2023-25652], [CVE-2023-25815], [CVE-2023-29007] |
USN-6050-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:60491000000 |
false |
patch |
[USN-6049-1], [CVE-2020-11612], [CVE-2021-21290], [CVE-2021-21295], [CVE-2021-21409], [CVE-2021-37136], [CVE-2021-37137], [CVE-2021-43797], [CVE-2022-41881], [CVE-2022-41915] |
USN-6049-1 -- Netty vulnerabilities |
| oval:com.ubuntu.jammy:def:60461000000 |
false |
patch |
[USN-6046-1] |
USN-6046-1 -- OpenSSL-ibmca vulnerabilities |
| oval:com.ubuntu.jammy:def:60441000000 |
false |
patch |
[USN-6044-1], [CVE-2023-1829], [CVE-2023-1872] |
USN-6044-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60431000000 |
false |
patch |
[USN-6043-1], [CVE-2023-0386], [CVE-2023-1829] |
USN-6043-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60421000000 |
false |
patch |
[USN-6042-1], [CVE-2023-1786] |
USN-6042-1 -- Cloud-init vulnerability |
| oval:com.ubuntu.jammy:def:60391000000 |
false |
patch |
[USN-6039-1], [CVE-2022-3996], [CVE-2023-0464], [CVE-2023-0466] |
USN-6039-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:60382000000 |
false |
patch |
[USN-6038-2], [CVE-2022-1705], [CVE-2022-27664], [CVE-2022-28131], [CVE-2022-2879], [CVE-2022-2880], [CVE-2022-29526], [CVE-2022-30629], [CVE-2022-30630], [CVE-2022-30631], [CVE-2022-30632], [CVE-2022-30633], [CVE-2022-30635], [CVE-2022-32148], [CVE-2022-32189], [CVE-2022-41717], [CVE-2023-24534], [CVE-2023-24537], [CVE-2023-24538] |
USN-6038-2 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:60381000000 |
false |
patch |
[USN-6038-1], [CVE-2022-1705], [CVE-2022-1962], [CVE-2022-27664], [CVE-2022-28131], [CVE-2022-2879], [CVE-2022-2880], [CVE-2022-29526], [CVE-2022-30629], [CVE-2022-30630], [CVE-2022-30631], [CVE-2022-30632], [CVE-2022-30633], [CVE-2022-30635], [CVE-2022-32148], [CVE-2022-32189], [CVE-2022-41715], [CVE-2022-41717], [CVE-2023-24534], [CVE-2023-24537], [CVE-2023-24538] |
USN-6038-1 -- Go vulnerabilities |
| oval:com.ubuntu.jammy:def:60371000000 |
false |
patch |
[USN-6037-1], [CVE-2021-37533] |
USN-6037-1 -- Apache Commons Net vulnerability |
| oval:com.ubuntu.jammy:def:60361000000 |
false |
patch |
[USN-6036-1], [CVE-2022-44940] |
USN-6036-1 -- PatchELF vulnerability |
| oval:com.ubuntu.jammy:def:60341000000 |
false |
patch |
[USN-6034-1], [CVE-2023-28450] |
USN-6034-1 -- Dnsmasq vulnerability |
| oval:com.ubuntu.jammy:def:60331000000 |
false |
patch |
[USN-6033-1], [CVE-2022-4269], [CVE-2023-1032], [CVE-2023-1076], [CVE-2023-1077], [CVE-2023-1079], [CVE-2023-1118], [CVE-2023-1583], [CVE-2023-1670], [CVE-2023-1829], [CVE-2023-1855], [CVE-2023-1989], [CVE-2023-1990], [CVE-2023-1998], [CVE-2023-25012], [CVE-2023-28466], [CVE-2023-28866], [CVE-2023-30456] |
USN-6033-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:60321000000 |
false |
patch |
[USN-6032-1], [CVE-2022-36280], [CVE-2022-4382], [CVE-2023-1074], [CVE-2023-1118], [CVE-2023-23559], [CVE-2023-26605], [CVE-2023-26607] |
USN-6032-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:60311000000 |
false |
patch |
[USN-6031-1], [CVE-2022-21505], [CVE-2022-3903], [CVE-2022-41849], [CVE-2022-4382], [CVE-2023-1074], [CVE-2023-1095], [CVE-2023-1118], [CVE-2023-1281], [CVE-2023-23559], [CVE-2023-26607] |
USN-6031-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:60281000000 |
false |
patch |
[USN-6028-1], [CVE-2023-28484], [CVE-2023-29469] |
USN-6028-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:60261000000 |
false |
patch |
[USN-6026-1], [CVE-2021-4166], [CVE-2021-4192], [CVE-2021-4193], [CVE-2022-0213], [CVE-2022-0261], [CVE-2022-0318], [CVE-2022-0319], [CVE-2022-0351], [CVE-2022-0359], [CVE-2022-0361], [CVE-2022-0368], [CVE-2022-0408], [CVE-2022-0443], [CVE-2022-0554], [CVE-2022-0572], [CVE-2022-0629], [CVE-2022-0685], [CVE-2022-0714], [CVE-2022-0729], [CVE-2022-2207] |
USN-6026-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:60251000000 |
false |
patch |
[USN-6025-1], [CVE-2022-4129], [CVE-2022-47929], [CVE-2022-4842], [CVE-2023-0386], [CVE-2023-0394], [CVE-2023-1073], [CVE-2023-1074], [CVE-2023-1281], [CVE-2023-1652], [CVE-2023-26545] |
USN-6025-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60241000000 |
false |
patch |
[USN-6024-1], [CVE-2022-3424], [CVE-2022-41218], [CVE-2022-47929], [CVE-2023-0468], [CVE-2023-1032], [CVE-2023-1281], [CVE-2023-22997], [CVE-2023-26545], [CVE-2023-26606], [CVE-2023-28328] |
USN-6024-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:60181000000 |
false |
patch |
[USN-6018-1], [CVE-2023-1326] |
USN-6018-1 -- Apport vulnerability |
| oval:com.ubuntu.jammy:def:60171000000 |
false |
patch |
[USN-6017-1], [CVE-2023-28879] |
USN-6017-1 -- Ghostscript vulnerability |
| oval:com.ubuntu.jammy:def:60151000000 |
false |
patch |
[USN-6015-1], [CVE-2023-0547], [CVE-2023-1945], [CVE-2023-29479], [CVE-2023-29533], [CVE-2023-29535], [CVE-2023-29536], [CVE-2023-29539], [CVE-2023-29541], [CVE-2023-29548], [CVE-2023-29550] |
USN-6015-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:60121000000 |
false |
patch |
[USN-6012-1], [CVE-2022-29221] |
USN-6012-1 -- Smarty vulnerability |
| oval:com.ubuntu.jammy:def:60111000000 |
false |
patch |
[USN-6011-1], [CVE-2021-31684], [CVE-2023-1370] |
USN-6011-1 -- Json-smart vulnerabilities |
| oval:com.ubuntu.jammy:def:60081000000 |
false |
patch |
[USN-6008-1], [CVE-2022-32278] |
USN-6008-1 -- Exo vulnerability |
| oval:com.ubuntu.jammy:def:60061000000 |
false |
patch |
[USN-6006-1], [CVE-2023-28260] |
USN-6006-1 -- .NET vulnerability |
| oval:com.ubuntu.jammy:def:60051000000 |
false |
patch |
[USN-6005-1], [CVE-2023-28486], [CVE-2023-28487] |
USN-6005-1 -- Sudo vulnerabilities |
| oval:com.ubuntu.jammy:def:60041000000 |
false |
patch |
[USN-6004-1], [CVE-2022-2196], [CVE-2022-3424], [CVE-2022-36280], [CVE-2022-41218], [CVE-2022-4382], [CVE-2022-48423], [CVE-2022-48424], [CVE-2023-0045], [CVE-2023-0210], [CVE-2023-0266], [CVE-2023-23454], [CVE-2023-23455], [CVE-2023-23559], [CVE-2023-26606], [CVE-2023-28328] |
USN-6004-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:59961000000 |
false |
patch |
[USN-5996-1], [CVE-2023-26767], [CVE-2023-26768], [CVE-2023-26769] |
USN-5996-1 -- Liblouis vulnerabilities |
| oval:com.ubuntu.jammy:def:59951000000 |
false |
patch |
[USN-5995-1], [CVE-2022-0413], [CVE-2022-1629], [CVE-2022-1674], [CVE-2022-1720], [CVE-2022-1733], [CVE-2022-1735], [CVE-2022-1785], [CVE-2022-1796], [CVE-2022-1851], [CVE-2022-1898], [CVE-2022-1927], [CVE-2022-1942], [CVE-2022-1968], [CVE-2022-2124], [CVE-2022-2125], [CVE-2022-2126], [CVE-2022-2129], [CVE-2022-2175], [CVE-2022-2183], [CVE-2022-2206], [CVE-2022-2304], [CVE-2022-2344], [CVE-2022-2345], [CVE-2022-2571], [CVE-2022-2581], [CVE-2022-2845], [CVE-2022-2849], [CVE-2022-2923], [CVE-2022-2946], [CVE-2022-2980] |
USN-5995-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:59941000000 |
false |
patch |
[USN-5994-1], [CVE-2023-0836] |
USN-5994-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:59931000000 |
false |
patch |
[USN-5993-1], [CVE-2023-0614], [CVE-2023-0922] |
USN-5993-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:59921000000 |
false |
patch |
[USN-5992-1], [CVE-2023-0614] |
USN-5992-1 -- ldb vulnerability |
| oval:com.ubuntu.jammy:def:59871000000 |
false |
patch |
[USN-5987-1], [CVE-2022-2196], [CVE-2022-3424], [CVE-2022-36280], [CVE-2022-41218], [CVE-2022-4382], [CVE-2022-48423], [CVE-2022-48424], [CVE-2023-0045], [CVE-2023-0210], [CVE-2023-0266], [CVE-2023-23454], [CVE-2023-23455], [CVE-2023-23559], [CVE-2023-26606], [CVE-2023-28328] |
USN-5987-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:59861000000 |
false |
patch |
[USN-5986-1], [CVE-2023-1393] |
USN-5986-1 -- X.Org X Server vulnerability |
| oval:com.ubuntu.jammy:def:59821000000 |
false |
patch |
[USN-5982-1], [CVE-2022-2196], [CVE-2022-3424], [CVE-2022-36280], [CVE-2022-41218], [CVE-2022-4382], [CVE-2022-48423], [CVE-2022-48424], [CVE-2023-0045], [CVE-2023-0210], [CVE-2023-0266], [CVE-2023-23454], [CVE-2023-23455], [CVE-2023-23559], [CVE-2023-26606], [CVE-2023-28328] |
USN-5982-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:59791000000 |
false |
patch |
[USN-5979-1], [CVE-2022-2196], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4382], [CVE-2023-0045], [CVE-2023-0266], [CVE-2023-0469], [CVE-2023-1195], [CVE-2023-23559] |
USN-5979-1 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:59781000000 |
false |
patch |
[USN-5978-1], [CVE-2022-2196], [CVE-2022-27672], [CVE-2022-4382], [CVE-2022-4842], [CVE-2023-0394], [CVE-2023-1073], [CVE-2023-1074], [CVE-2023-1075], [CVE-2023-1078], [CVE-2023-1281], [CVE-2023-23559], [CVE-2023-26545] |
USN-5978-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59771000000 |
false |
patch |
[USN-5977-1], [CVE-2022-2196], [CVE-2023-1032], [CVE-2023-1281] |
USN-5977-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59761000000 |
false |
patch |
[USN-5976-1], [CVE-2022-2196], [CVE-2022-3061], [CVE-2022-3628], [CVE-2022-36280], [CVE-2022-3646], [CVE-2022-3649], [CVE-2022-41850], [CVE-2023-0394], [CVE-2023-0461] |
USN-5976-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59721000000 |
false |
patch |
[USN-5972-1], [CVE-2023-25751], [CVE-2023-25752], [CVE-2023-28162], [CVE-2023-28164], [CVE-2023-28176] |
USN-5972-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:59681000000 |
false |
patch |
[USN-5968-1], [CVE-2022-24439] |
USN-5968-1 -- GitPython vulnerability |
| oval:com.ubuntu.jammy:def:59663000000 |
false |
patch |
[USN-5966-3], [CVE-2022-37703], [CVE-2022-37704], [CVE-2022-37705] |
USN-5966-3 -- amanda regression |
| oval:com.ubuntu.jammy:def:59662000000 |
false |
patch |
[USN-5966-2] |
USN-5966-2 -- amanda regression |
| oval:com.ubuntu.jammy:def:59661000000 |
false |
patch |
[USN-5966-1], [CVE-2022-37703], [CVE-2022-37704], [CVE-2022-37705] |
USN-5966-1 -- amanda vulnerabilities |
| oval:com.ubuntu.jammy:def:59641000000 |
false |
patch |
[USN-5964-1], [CVE-2023-27533], [CVE-2023-27534], [CVE-2023-27535], [CVE-2023-27536], [CVE-2023-27538] |
USN-5964-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:59631000000 |
false |
patch |
[USN-5963-1], [CVE-2022-47024], [CVE-2023-0049], [CVE-2023-0051], [CVE-2023-0054], [CVE-2023-0288], [CVE-2023-0433], [CVE-2023-1170], [CVE-2023-1175], [CVE-2023-1264] |
USN-5963-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:59621000000 |
false |
patch |
[USN-5962-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-0468], [CVE-2023-26605] |
USN-5962-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:59611000000 |
false |
patch |
[USN-5961-1], [CVE-2018-10753], [CVE-2018-10771], [CVE-2019-1010069], [CVE-2021-32434], [CVE-2021-32435], [CVE-2021-32436] |
USN-5961-1 -- abcm2ps vulnerabilities |
| oval:com.ubuntu.jammy:def:59601000000 |
false |
patch |
[USN-5960-1], [CVE-2023-24329] |
USN-5960-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:59561000000 |
false |
patch |
[USN-5956-1], [CVE-2016-10033], [CVE-2016-10045], [CVE-2017-11503], [CVE-2017-5223], [CVE-2018-19296], [CVE-2020-13625], [CVE-2021-3603] |
USN-5956-1 -- PHPMailer vulnerabilities |
| oval:com.ubuntu.jammy:def:59481000000 |
false |
patch |
[USN-5948-1], [CVE-2023-23934], [CVE-2023-25577] |
USN-5948-1 -- Werkzeug vulnerabilities |
| oval:com.ubuntu.jammy:def:59471000000 |
false |
patch |
[USN-5947-1], [CVE-2019-9942], [CVE-2022-23614], [CVE-2022-39261] |
USN-5947-1 -- Twig vulnerabilities |
| oval:com.ubuntu.jammy:def:59461000000 |
false |
patch |
[USN-5946-1], [CVE-2021-39139], [CVE-2021-39140], [CVE-2021-39141], [CVE-2021-39144], [CVE-2021-39145], [CVE-2021-39146], [CVE-2021-39147], [CVE-2021-39148], [CVE-2021-39149], [CVE-2021-39150], [CVE-2021-39151], [CVE-2021-39152], [CVE-2021-39153], [CVE-2021-39154], [CVE-2022-41966] |
USN-5946-1 -- XStream vulnerabilities |
| oval:com.ubuntu.jammy:def:59451000000 |
false |
patch |
[USN-5945-1], [CVE-2021-22569], [CVE-2021-22570], [CVE-2022-1941] |
USN-5945-1 -- Protocol Buffers vulnerabilities |
| oval:com.ubuntu.jammy:def:59441000000 |
false |
patch |
[USN-5944-1], [CVE-2022-25857], [CVE-2022-38749], [CVE-2022-38750], [CVE-2022-38751] |
USN-5944-1 -- SnakeYAML vulnerabilities |
| oval:com.ubuntu.jammy:def:59431000000 |
false |
patch |
[USN-5943-1], [CVE-2023-0616], [CVE-2023-25728], [CVE-2023-25730], [CVE-2023-0767], [CVE-2023-25735], [CVE-2023-25737], [CVE-2023-25729], [CVE-2023-25739], [CVE-2023-25732], [CVE-2023-25742], [CVE-2023-25746] |
USN-5943-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:59421000000 |
false |
patch |
[USN-5942-1], [CVE-2023-25690], [CVE-2023-27522] |
USN-5942-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:59411000000 |
false |
patch |
[USN-5941-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-0468], [CVE-2023-26605] |
USN-5941-1 -- Linux kernel (KVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59381000000 |
false |
patch |
[USN-5938-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-0468], [CVE-2023-26605] |
USN-5938-1 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:59371000000 |
false |
patch |
[USN-5937-1], [CVE-2022-47021] |
USN-5937-1 -- Opusfile vulnerability |
| oval:com.ubuntu.jammy:def:59351000000 |
false |
patch |
[USN-5935-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-0468], [CVE-2023-26605] |
USN-5935-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:59331000000 |
false |
patch |
[USN-5933-1], [CVE-2023-1017], [CVE-2023-1018] |
USN-5933-1 -- Libtpms vulnerabilities |
| oval:com.ubuntu.jammy:def:59321000000 |
false |
patch |
[USN-5932-1], [CVE-2022-31001], [CVE-2022-31002], [CVE-2022-31003], [CVE-2022-47516], [CVE-2023-22741] |
USN-5932-1 -- Sofia-SIP vulnerabilities |
| oval:com.ubuntu.jammy:def:59281000000 |
false |
patch |
[USN-5928-1], [CVE-2022-3821], [CVE-2022-4415], [CVE-2022-45873] |
USN-5928-1 -- systemd vulnerabilities |
| oval:com.ubuntu.jammy:def:59231000000 |
false |
patch |
[USN-5923-1], [CVE-2023-0795], [CVE-2023-0796], [CVE-2023-0797], [CVE-2023-0798], [CVE-2023-0799], [CVE-2023-0800], [CVE-2023-0801], [CVE-2023-0802], [CVE-2023-0803], [CVE-2023-0804] |
USN-5923-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:59211000000 |
false |
patch |
[USN-5921-1], [CVE-2022-29154] |
USN-5921-1 -- rsync vulnerabilities |
| oval:com.ubuntu.jammy:def:59151000000 |
false |
patch |
[USN-5915-1], [CVE-2022-36280], [CVE-2022-3707], [CVE-2022-41218], [CVE-2022-4379], [CVE-2022-47929], [CVE-2023-0045], [CVE-2023-0179], [CVE-2023-0210], [CVE-2023-0266], [CVE-2023-0461], [CVE-2023-23454], [CVE-2023-23455] |
USN-5915-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59141000000 |
false |
patch |
[USN-5914-1], [CVE-2022-3567], [CVE-2022-42896], [CVE-2022-4379], [CVE-2022-43945], [CVE-2022-45934], [CVE-2022-47520], [CVE-2023-0045], [CVE-2023-0461], [CVE-2023-0469] |
USN-5914-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59131000000 |
false |
patch |
[USN-5913-1], [CVE-2022-20566], [CVE-2022-3565], [CVE-2022-36879], [CVE-2022-43750], [CVE-2022-4379], [CVE-2022-47520], [CVE-2023-0045], [CVE-2023-0461] |
USN-5913-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:59121000000 |
false |
patch |
[USN-5912-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-42328], [CVE-2022-42329], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-0468], [CVE-2023-26605] |
USN-5912-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:59111000000 |
false |
patch |
[USN-5911-1], [CVE-2022-3169], [CVE-2022-3344], [CVE-2022-3435], [CVE-2022-3521], [CVE-2022-3545], [CVE-2022-4139], [CVE-2022-4379], [CVE-2022-45869], [CVE-2022-47518], [CVE-2022-47519], [CVE-2022-47520], [CVE-2022-47521], [CVE-2023-0179], [CVE-2023-0461], [CVE-2023-26605] |
USN-5911-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:59101000000 |
false |
patch |
[USN-5910-1], [CVE-2022-44570], [CVE-2022-44571], [CVE-2022-44572] |
USN-5910-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:59081000000 |
false |
patch |
[USN-5908-1], [CVE-2023-27320] |
USN-5908-1 -- Sudo vulnerability |
| oval:com.ubuntu.jammy:def:59071000000 |
false |
patch |
[USN-5907-1], [CVE-2022-4904] |
USN-5907-1 -- c-ares vulnerability |
| oval:com.ubuntu.jammy:def:59061000000 |
false |
patch |
[USN-5906-1], [CVE-2022-41862] |
USN-5906-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:59042000000 |
false |
patch |
[USN-5904-2], [CVE-2021-33844] |
USN-5904-2 -- SoX regression |
| oval:com.ubuntu.jammy:def:59041000000 |
false |
patch |
[USN-5904-1], [CVE-2019-13590], [CVE-2021-23159], [CVE-2021-23172], [CVE-2021-23210], [CVE-2021-33844], [CVE-2021-3643], [CVE-2021-40426], [CVE-2022-31650], [CVE-2022-31651] |
USN-5904-1 -- SoX vulnerabilities |
| oval:com.ubuntu.jammy:def:59031000000 |
false |
patch |
[USN-5903-1], [CVE-2022-22707], [CVE-2022-41556] |
USN-5903-1 -- lighttpd vulnerabilities |
| oval:com.ubuntu.jammy:def:59021000000 |
false |
patch |
[USN-5902-1], [CVE-2023-0567], [CVE-2023-0568], [CVE-2023-0662] |
USN-5902-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:59011000000 |
false |
patch |
[USN-5901-1], [CVE-2023-0361] |
USN-5901-1 -- GnuTLS vulnerability |
| oval:com.ubuntu.jammy:def:59001000000 |
false |
patch |
[USN-5900-1], [CVE-2022-48303] |
USN-5900-1 -- tar vulnerability |
| oval:com.ubuntu.jammy:def:58991000000 |
false |
patch |
[USN-5899-1], [CVE-2022-46391] |
USN-5899-1 -- AWStats vulnerability |
| oval:com.ubuntu.jammy:def:58981000000 |
false |
patch |
[USN-5898-1], [CVE-2023-21830], [CVE-2023-21843] |
USN-5898-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:58971000000 |
false |
patch |
[USN-5897-1], [CVE-2023-21835], [CVE-2023-21843] |
USN-5897-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:58961000000 |
false |
patch |
[USN-5896-1], [CVE-2022-30122], [CVE-2022-30123] |
USN-5896-1 -- Rack vulnerabilities |
| oval:com.ubuntu.jammy:def:58951000000 |
false |
patch |
[USN-5895-1], [CVE-2022-38850], [CVE-2022-38851], [CVE-2022-38855], [CVE-2022-38858], [CVE-2022-38860], [CVE-2022-38861], [CVE-2022-38863], [CVE-2022-38864], [CVE-2022-38865], [CVE-2022-38866] |
USN-5895-1 -- MPlayer vulnerabilities |
| oval:com.ubuntu.jammy:def:58931000000 |
false |
patch |
[USN-5893-1], [CVE-2023-23529] |
USN-5893-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:58921000000 |
false |
patch |
[USN-5892-1], [CVE-2022-3479], [CVE-2023-0767] |
USN-5892-1 -- NSS vulnerabilities |
| oval:com.ubuntu.jammy:def:58911000000 |
false |
patch |
[USN-5891-1], [CVE-2023-23914], [CVE-2023-23915], [CVE-2023-23916] |
USN-5891-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:58901000000 |
false |
patch |
[USN-5890-1], [CVE-2022-4337], [CVE-2022-4338] |
USN-5890-1 -- Open vSwitch vulnerabilities |
| oval:com.ubuntu.jammy:def:58891000000 |
false |
patch |
[USN-5889-1], [CVE-2019-6777], [CVE-2019-6990], [CVE-2019-6991], [CVE-2019-6992], [CVE-2019-7325], [CVE-2019-7326], [CVE-2019-7327], [CVE-2019-7328], [CVE-2019-7329], [CVE-2019-7330], [CVE-2019-7331], [CVE-2019-7332], [CVE-2022-29806] |
USN-5889-1 -- ZoneMinder vulnerabilities |
| oval:com.ubuntu.jammy:def:58871000000 |
false |
patch |
[USN-5887-1], [CVE-2023-20032], [CVE-2023-20052] |
USN-5887-1 -- ClamAV vulnerabilities |
| oval:com.ubuntu.jammy:def:58861000000 |
false |
patch |
[USN-5886-1], [CVE-2022-21216], [CVE-2022-33196], [CVE-2022-33972], [CVE-2022-38090] |
USN-5886-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:58851000000 |
false |
patch |
[USN-5885-1], [CVE-2022-24963] |
USN-5885-1 -- APR vulnerability |
| oval:com.ubuntu.jammy:def:58821000000 |
false |
patch |
[USN-5882-1], [CVE-2015-8979], [CVE-2019-1010228], [CVE-2021-41687], [CVE-2021-41688], [CVE-2021-41689], [CVE-2021-41690], [CVE-2022-2119], [CVE-2022-2120], [CVE-2022-2121], [CVE-2022-43272] |
USN-5882-1 -- DCMTK vulnerabilities |
| oval:com.ubuntu.jammy:def:58791000000 |
false |
patch |
[USN-5879-1], [CVE-2022-3619], [CVE-2022-3628], [CVE-2022-3640], [CVE-2022-3643], [CVE-2022-42895], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-45934], [CVE-2023-0590] |
USN-5879-1 -- Linux kernel (HWE) vulnerabilities |
| oval:com.ubuntu.jammy:def:58761000000 |
false |
patch |
[USN-5876-1], [CVE-2022-3543], [CVE-2022-3619], [CVE-2022-3623], [CVE-2022-3628], [CVE-2022-3640], [CVE-2022-41849], [CVE-2022-41850], [CVE-2022-42895], [CVE-2022-47940], [CVE-2023-0590] |
USN-5876-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:58731000000 |
false |
patch |
[USN-5873-1], [CVE-2020-14040], [CVE-2020-28851], [CVE-2020-28852], [CVE-2021-38561], [CVE-2022-32149] |
USN-5873-1 -- Go Text vulnerabilities |
| oval:com.ubuntu.jammy:def:58711000000 |
false |
patch |
[USN-5871-1], [CVE-2023-22490], [CVE-2023-23946] |
USN-5871-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:58701000000 |
false |
patch |
[USN-5870-1], [CVE-2022-25147] |
USN-5870-1 -- apr-util vulnerability |
| oval:com.ubuntu.jammy:def:58691000000 |
false |
patch |
[USN-5869-1], [CVE-2023-25725] |
USN-5869-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:58681000000 |
false |
patch |
[USN-5868-1], [CVE-2023-24580] |
USN-5868-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:58671000000 |
false |
patch |
[USN-5867-1], [CVE-2022-42826], [CVE-2023-23517], [CVE-2023-23518] |
USN-5867-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:58601000000 |
false |
patch |
[USN-5860-1], [CVE-2022-3543], [CVE-2022-3619], [CVE-2022-3623], [CVE-2022-3628], [CVE-2022-3640], [CVE-2022-3643], [CVE-2022-41849], [CVE-2022-41850], [CVE-2022-42895], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-45934], [CVE-2022-47940], [CVE-2023-0590] |
USN-5860-1 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:58581000000 |
false |
patch |
[USN-5858-1], [CVE-2022-3545], [CVE-2022-42895], [CVE-2022-45934], [CVE-2023-0179] |
USN-5858-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:58571000000 |
false |
patch |
[USN-5857-1], [CVE-2023-0179] |
USN-5857-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:58561000000 |
false |
patch |
[USN-5856-1], [CVE-2022-1048], [CVE-2022-3424], [CVE-2023-0179] |
USN-5856-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:58553000000 |
false |
patch |
[USN-5855-3] |
USN-5855-3 -- ImageMagick regression |
| oval:com.ubuntu.jammy:def:58552000000 |
false |
patch |
[USN-5855-2], [CVE-2022-44267], [CVE-2022-44268] |
USN-5855-2 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:58521000000 |
false |
patch |
[USN-5852-1], [CVE-2022-47950] |
USN-5852-1 -- OpenStack Swift vulnerability |
| oval:com.ubuntu.jammy:def:58511000000 |
false |
patch |
[USN-5851-1], [CVE-2022-3543], [CVE-2022-3619], [CVE-2022-3623], [CVE-2022-3628], [CVE-2022-3640], [CVE-2022-41849], [CVE-2022-41850], [CVE-2022-42895], [CVE-2022-47940], [CVE-2023-0590] |
USN-5851-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:58481000000 |
false |
patch |
[USN-5848-1], [CVE-2022-46663] |
USN-5848-1 -- less vulnerability |
| oval:com.ubuntu.jammy:def:58471000000 |
false |
patch |
[USN-5847-1], [CVE-2020-7729], [CVE-2022-0436], [CVE-2022-1537] |
USN-5847-1 -- Grunt vulnerabilities |
| oval:com.ubuntu.jammy:def:58461000000 |
false |
patch |
[USN-5846-1], [CVE-2023-0494] |
USN-5846-1 -- X.Org X Server vulnerability |
| oval:com.ubuntu.jammy:def:58441000000 |
false |
patch |
[USN-5844-1], [CVE-2022-4203], [CVE-2022-4304], [CVE-2022-4450], [CVE-2023-0215], [CVE-2023-0216], [CVE-2023-0217], [CVE-2023-0286], [CVE-2023-0401] |
USN-5844-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:58431000000 |
false |
patch |
[USN-5843-1], [CVE-2022-47016] |
USN-5843-1 -- tmux vulnerability |
| oval:com.ubuntu.jammy:def:58421000000 |
false |
patch |
[USN-5842-1], [CVE-2023-0341] |
USN-5842-1 -- EditorConfig Core C vulnerability |
| oval:com.ubuntu.jammy:def:58401000000 |
false |
patch |
[USN-5840-1], [CVE-2018-5786], [CVE-2020-25467], [CVE-2021-27345], [CVE-2021-27347], [CVE-2022-26291], [CVE-2022-28044] |
USN-5840-1 -- Long Range ZIP vulnerabilities |
| oval:com.ubuntu.jammy:def:58391000000 |
false |
patch |
[USN-5839-1], [CVE-2006-20001], [CVE-2022-36760], [CVE-2022-37436] |
USN-5839-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:58381000000 |
false |
patch |
[USN-5838-1], [CVE-2022-35014], [CVE-2022-35015], [CVE-2022-35016], [CVE-2022-35017], [CVE-2022-35018], [CVE-2022-35019], [CVE-2022-35020] |
USN-5838-1 -- AdvanceCOMP vulnerabilities |
| oval:com.ubuntu.jammy:def:58371000000 |
false |
patch |
[USN-5837-1], [CVE-2023-23969] |
USN-5837-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:58353000000 |
false |
patch |
[USN-5835-3], [CVE-2022-47951] |
USN-5835-3 -- Nova vulnerability |
| oval:com.ubuntu.jammy:def:58352000000 |
false |
patch |
[USN-5835-2], [CVE-2022-47951] |
USN-5835-2 -- OpenStack Glance vulnerability |
| oval:com.ubuntu.jammy:def:58351000000 |
false |
patch |
[USN-5835-1], [CVE-2022-47951] |
USN-5835-1 -- Cinder vulnerability |
| oval:com.ubuntu.jammy:def:58331000000 |
false |
patch |
[USN-5833-1], [CVE-2022-40899] |
USN-5833-1 -- python-future vulnerability |
| oval:com.ubuntu.jammy:def:58311000000 |
false |
patch |
[USN-5831-1], [CVE-2022-3643], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-45934] |
USN-5831-1 -- Linux kernel (Azure CVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:58281000000 |
false |
patch |
[USN-5828-1], [CVE-2018-20217], [CVE-2022-42898] |
USN-5828-1 -- Kerberos vulnerabilities |
| oval:com.ubuntu.jammy:def:58271000000 |
false |
patch |
[USN-5827-1], [CVE-2022-3094], [CVE-2022-3736], [CVE-2022-3924] |
USN-5827-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:58252000000 |
false |
patch |
[USN-5825-2], [CVE-2022-28321] |
USN-5825-2 -- PAM regressions |
| oval:com.ubuntu.jammy:def:58251000000 |
false |
patch |
[USN-5825-1], [CVE-2022-28321] |
USN-5825-1 -- PAM vulnerability |
| oval:com.ubuntu.jammy:def:58241000000 |
false |
patch |
[USN-5824-1], [CVE-2022-45403], [CVE-2022-45404], [CVE-2022-45405], [CVE-2022-45406], [CVE-2022-45408], [CVE-2022-45409], [CVE-2022-45410], [CVE-2022-45411], [CVE-2022-45412], [CVE-2022-45416], [CVE-2022-45418], [CVE-2022-45420], [CVE-2022-45421], [CVE-2022-45414], [CVE-2022-46880], [CVE-2022-46872], [CVE-2022-46881], [CVE-2022-46882], [CVE-2022-46878], [CVE-2022-46874], [CVE-2022-46871], [CVE-2023-23598], [CVE-2023-23599], [CVE-2023-23601], [CVE-2023-23602], [CVE-2022-46877], [CVE-2023-23603], [CVE-2023-23605], [CVE-2023-0430] |
USN-5824-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:58233000000 |
false |
patch |
[USN-5823-3] |
USN-5823-3 -- MySQL regression |
| oval:com.ubuntu.jammy:def:58231000000 |
false |
patch |
[USN-5823-1], [CVE-2022-32221], [CVE-2023-21836], [CVE-2023-21840], [CVE-2023-21863], [CVE-2023-21867], [CVE-2023-21868], [CVE-2023-21869], [CVE-2023-21870], [CVE-2023-21871], [CVE-2023-21873], [CVE-2023-21875], [CVE-2023-21876], [CVE-2023-21877], [CVE-2023-21878], [CVE-2023-21879], [CVE-2023-21880], [CVE-2023-21881], [CVE-2023-21882], [CVE-2023-21883], [CVE-2023-21887] |
USN-5823-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:58221000000 |
false |
patch |
[USN-5822-1], [CVE-2021-20251], [CVE-2022-3437], [CVE-2022-37966], [CVE-2022-37967], [CVE-2022-38023], [CVE-2022-42898], [CVE-2022-45141] |
USN-5822-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:58213000000 |
false |
patch |
[USN-5821-3], [CVE-2022-40898] |
USN-5821-3 -- pip regression |
| oval:com.ubuntu.jammy:def:58211000000 |
false |
patch |
[USN-5821-1], [CVE-2022-40898] |
USN-5821-1 -- wheel vulnerability |
| oval:com.ubuntu.jammy:def:58201000000 |
false |
patch |
[USN-5820-1], [CVE-2022-4515] |
USN-5820-1 -- exuberant-ctags vulnerability |
| oval:com.ubuntu.jammy:def:58191000000 |
false |
patch |
[USN-5819-1], [CVE-2023-0056] |
USN-5819-1 -- HAProxy vulnerability |
| oval:com.ubuntu.jammy:def:58181000000 |
false |
patch |
[USN-5818-1], [CVE-2022-31631] |
USN-5818-1 -- PHP vulnerability |
| oval:com.ubuntu.jammy:def:58171000000 |
false |
patch |
[USN-5817-1], [CVE-2022-40897] |
USN-5817-1 -- Setuptools vulnerability |
| oval:com.ubuntu.jammy:def:58141000000 |
false |
patch |
[USN-5814-1], [CVE-2022-3643], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-45934] |
USN-5814-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:58111000000 |
false |
patch |
[USN-5811-1], [CVE-2022-33070], [CVE-2023-22809] |
USN-5811-1 -- Sudo vulnerabilities |
| oval:com.ubuntu.jammy:def:58101000000 |
false |
patch |
[USN-5810-1], [CVE-2022-23521], [CVE-2022-41903] |
USN-5810-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:58071000000 |
false |
patch |
[USN-5807-1], [CVE-2022-44617], [CVE-2022-46285], [CVE-2022-4883] |
USN-5807-1 -- libXpm vulnerabilities |
| oval:com.ubuntu.jammy:def:58062000000 |
false |
patch |
[USN-5806-2], [CVE-2021-33621] |
USN-5806-2 -- Ruby vulnerability |
| oval:com.ubuntu.jammy:def:58031000000 |
false |
patch |
[USN-5803-1], [CVE-2022-3643], [CVE-2022-42896], [CVE-2022-4378], [CVE-2022-45934] |
USN-5803-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:58011000000 |
false |
patch |
[USN-5801-1], [CVE-2022-0392], [CVE-2022-0417] |
USN-5801-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:57991000000 |
false |
patch |
[USN-5799-1], [CVE-2022-4378] |
USN-5799-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:57981000000 |
false |
patch |
[USN-5798-1], [CVE-2023-21538] |
USN-5798-1 -- .NET 6 vulnerability |
| oval:com.ubuntu.jammy:def:57971000000 |
false |
patch |
[USN-5797-1], [CVE-2022-42852], [CVE-2022-42856], [CVE-2022-42867], [CVE-2022-46692], [CVE-2022-46698], [CVE-2022-46699], [CVE-2022-46700] |
USN-5797-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:57961000000 |
false |
patch |
[USN-5796-1], [CVE-2022-38223] |
USN-5796-1 -- w3m vulnerability |
| oval:com.ubuntu.jammy:def:57951000000 |
false |
patch |
[USN-5795-1], [CVE-2022-44792], [CVE-2022-44793] |
USN-5795-1 -- Net-SNMP vulnerabilities |
| oval:com.ubuntu.jammy:def:57922000000 |
false |
patch |
[USN-5792-2], [CVE-2022-0171], [CVE-2022-20421], [CVE-2022-2663], [CVE-2022-3061], [CVE-2022-3303], [CVE-2022-3586], [CVE-2022-3646], [CVE-2022-3649], [CVE-2022-39188], [CVE-2022-39842], [CVE-2022-40307], [CVE-2022-4095], [CVE-2022-43750] |
USN-5792-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57921000000 |
false |
patch |
[USN-5792-1], [CVE-2022-0171], [CVE-2022-20421], [CVE-2022-2663], [CVE-2022-3061], [CVE-2022-3303], [CVE-2022-3586], [CVE-2022-3646], [CVE-2022-3649], [CVE-2022-39188], [CVE-2022-39842], [CVE-2022-40307], [CVE-2022-4095], [CVE-2022-43750] |
USN-5792-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57881000000 |
false |
patch |
[USN-5788-1], [CVE-2022-43551], [CVE-2022-43552] |
USN-5788-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:57871000000 |
false |
patch |
[USN-5787-1], [CVE-2022-47629] |
USN-5787-1 -- Libksba vulnerability |
| oval:com.ubuntu.jammy:def:57861000000 |
false |
patch |
[USN-5786-1], [CVE-2022-37290] |
USN-5786-1 -- GNOME Files vulnerability |
| oval:com.ubuntu.jammy:def:57851000000 |
false |
patch |
[USN-5785-1], [CVE-2019-17185], [CVE-2022-41860], [CVE-2022-41861] |
USN-5785-1 -- FreeRADIUS vulnerabilities |
| oval:com.ubuntu.jammy:def:57831000000 |
false |
patch |
[USN-5783-1], [CVE-2022-42896] |
USN-5783-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:57801000000 |
false |
patch |
[USN-5780-1], [CVE-2022-3524], [CVE-2022-3619], [CVE-2022-3628], [CVE-2022-42895], [CVE-2022-42896] |
USN-5780-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:57791000000 |
false |
patch |
[USN-5779-1], [CVE-2022-3524], [CVE-2022-3564], [CVE-2022-3565], [CVE-2022-3566], [CVE-2022-3567], [CVE-2022-3594], [CVE-2022-3621], [CVE-2022-42703], [CVE-2022-43945] |
USN-5779-1 -- Linux kernel (Azure) vulnerabilities |
| oval:com.ubuntu.jammy:def:57781000000 |
false |
patch |
[USN-5778-1], [CVE-2022-4283], [CVE-2022-46340], [CVE-2022-46341], [CVE-2022-46342], [CVE-2022-46343], [CVE-2022-46344] |
USN-5778-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:57771000000 |
false |
patch |
[USN-5777-1], [CVE-2022-24303], [CVE-2022-45198] |
USN-5777-1 -- Pillow vulnerabilities |
| oval:com.ubuntu.jammy:def:57761000000 |
false |
patch |
[USN-5776-1], [CVE-2022-23471], [CVE-2022-24769], [CVE-2022-24778], [CVE-2022-31030] |
USN-5776-1 -- containerd vulnerabilities |
| oval:com.ubuntu.jammy:def:57731000000 |
false |
patch |
[USN-5773-1], [CVE-2022-26365], [CVE-2022-33743], [CVE-2022-3524], [CVE-2022-3564], [CVE-2022-3566], [CVE-2022-3567], [CVE-2022-3594], [CVE-2022-3621], [CVE-2022-42703], [CVE-2022-43945] |
USN-5773-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:57721000000 |
false |
patch |
[USN-5772-1], [CVE-2021-3682], [CVE-2021-3750], [CVE-2021-3930], [CVE-2022-0216], [CVE-2022-2962], [CVE-2022-3165] |
USN-5772-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:57671000000 |
false |
patch |
[USN-5767-1], [CVE-2022-37454], [CVE-2022-45061] |
USN-5767-1 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:57641000000 |
false |
patch |
[USN-5764-1], [CVE-2022-2347], [CVE-2022-30552], [CVE-2022-30767], [CVE-2022-30790], [CVE-2022-33103], [CVE-2022-33967], [CVE-2022-34835] |
USN-5764-1 -- U-Boot vulnerabilities |
| oval:com.ubuntu.jammy:def:57631000000 |
false |
patch |
[USN-5763-1], [CVE-2021-33430], [CVE-2021-34141], [CVE-2021-41495], [CVE-2021-41496] |
USN-5763-1 -- NumPy vulnerabilities |
| oval:com.ubuntu.jammy:def:57621000000 |
false |
patch |
[USN-5762-1], [CVE-2022-38533] |
USN-5762-1 -- GNU binutils vulnerability |
| oval:com.ubuntu.jammy:def:57611000000 |
false |
patch |
[USN-5761-1] |
USN-5761-1 -- ca-certificates update |
| oval:com.ubuntu.jammy:def:57601000000 |
false |
patch |
[USN-5760-1], [CVE-2022-2309], [CVE-2022-40303], [CVE-2022-40304] |
USN-5760-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:57591000000 |
false |
patch |
[USN-5759-1], [CVE-2021-45940], [CVE-2021-45941], [CVE-2022-3533], [CVE-2022-3534], [CVE-2022-3606] |
USN-5759-1 -- LibBPF vulnerabilities |
| oval:com.ubuntu.jammy:def:57552000000 |
false |
patch |
[USN-5755-2], [CVE-2022-3524], [CVE-2022-3564], [CVE-2022-3565], [CVE-2022-3566], [CVE-2022-3567], [CVE-2022-3594], [CVE-2022-3621], [CVE-2022-42703], [CVE-2022-43945] |
USN-5755-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57551000000 |
false |
patch |
[USN-5755-1], [CVE-2022-3524], [CVE-2022-3564], [CVE-2022-3565], [CVE-2022-3566], [CVE-2022-3567], [CVE-2022-3594], [CVE-2022-3621], [CVE-2022-42703], [CVE-2022-43945] |
USN-5755-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57531000000 |
false |
patch |
[USN-5753-1], [CVE-2022-3328] |
USN-5753-1 -- snapd vulnerability |
| oval:com.ubuntu.jammy:def:57521000000 |
false |
patch |
[USN-5752-1], [CVE-2022-2602], [CVE-2022-41674], [CVE-2022-42719], [CVE-2022-42720], [CVE-2022-42721], [CVE-2022-42722] |
USN-5752-1 -- Linux kernel (Azure CVM) vulnerabilities |
| oval:com.ubuntu.jammy:def:57481000000 |
false |
patch |
[USN-5748-1], [CVE-2022-39377] |
USN-5748-1 -- Sysstat vulnerability |
| oval:com.ubuntu.jammy:def:57451000000 |
false |
patch |
[USN-5745-1], [CVE-2013-4235] |
USN-5745-1 -- shadow vulnerability |
| oval:com.ubuntu.jammy:def:57432000000 |
false |
patch |
[USN-5743-2], [CVE-2022-3970] |
USN-5743-2 -- LibTIFF vulnerability |
| oval:com.ubuntu.jammy:def:57421000000 |
false |
patch |
[USN-5742-1], [CVE-2017-9937] |
USN-5742-1 -- JBIG-KIT vulnerability |
| oval:com.ubuntu.jammy:def:57411000000 |
false |
patch |
[USN-5741-1], [CVE-2022-3559] |
USN-5741-1 -- Exim vulnerability |
| oval:com.ubuntu.jammy:def:57401000000 |
false |
patch |
[USN-5740-1], [CVE-2022-3550], [CVE-2022-3551] |
USN-5740-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:57392000000 |
false |
patch |
[USN-5739-2] |
USN-5739-2 -- MariaDB regression |
| oval:com.ubuntu.jammy:def:57391000000 |
false |
patch |
[USN-5739-1], [CVE-2018-25032], [CVE-2021-46669], [CVE-2022-21427], [CVE-2022-27376], [CVE-2022-27377], [CVE-2022-27378], [CVE-2022-27379], [CVE-2022-27380], [CVE-2022-27381], [CVE-2022-27382], [CVE-2022-27383], [CVE-2022-27384], [CVE-2022-27386], [CVE-2022-27387], [CVE-2022-27444], [CVE-2022-27445], [CVE-2022-27446], [CVE-2022-27447], [CVE-2022-27448], [CVE-2022-27449], [CVE-2022-27451], [CVE-2022-27452], [CVE-2022-27455], [CVE-2022-27456], [CVE-2022-27457], [CVE-2022-27458], [CVE-2022-32081], [CVE-2022-32082], [CVE-2022-32083], [CVE-2022-32084], [CVE-2022-32085], [CVE-2022-32086], [CVE-2022-32087], [CVE-2022-32088], [CVE-2022-32089], [CVE-2022-32091] |
USN-5739-1 -- MariaDB vulnerabilities |
| oval:com.ubuntu.jammy:def:57362000000 |
false |
patch |
[USN-5736-2], [CVE-2021-20224], [CVE-2021-20241], [CVE-2021-20243], [CVE-2021-20244], [CVE-2021-20245], [CVE-2021-20246], [CVE-2021-20309], [CVE-2021-20312], [CVE-2021-20313], [CVE-2021-3574], [CVE-2021-39212], [CVE-2021-4219], [CVE-2022-1114], [CVE-2022-28463], [CVE-2022-32545], [CVE-2022-32546], [CVE-2022-32547] |
USN-5736-2 -- ImageMagick vulnerabilities |
| oval:com.ubuntu.jammy:def:57341000000 |
false |
patch |
[USN-5734-1], [CVE-2022-39282], [CVE-2022-39283], [CVE-2022-39316], [CVE-2022-39317], [CVE-2022-39318], [CVE-2022-39319], [CVE-2022-39320], [CVE-2022-39347] |
USN-5734-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:57331000000 |
false |
patch |
[USN-5733-1], [CVE-2017-6888], [CVE-2020-0499], [CVE-2021-0561] |
USN-5733-1 -- FLAC vulnerabilities |
| oval:com.ubuntu.jammy:def:57321000000 |
false |
patch |
[USN-5732-1], [CVE-2022-3204] |
USN-5732-1 -- Unbound vulnerability |
| oval:com.ubuntu.jammy:def:57311000000 |
false |
patch |
[USN-5731-1], [CVE-2022-41973], [CVE-2022-41974] |
USN-5731-1 -- multipath-tools vulnerabilities |
| oval:com.ubuntu.jammy:def:57301000000 |
false |
patch |
[USN-5730-1], [CVE-2022-32888], [CVE-2022-32923], [CVE-2022-42799], [CVE-2022-42823], [CVE-2022-42824] |
USN-5730-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:57292000000 |
false |
patch |
[USN-5729-2], [CVE-2022-20422], [CVE-2022-2905], [CVE-2022-2978], [CVE-2022-3028], [CVE-2022-3625], [CVE-2022-3635], [CVE-2022-39190], [CVE-2022-40768] |
USN-5729-2 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57291000000 |
false |
patch |
[USN-5729-1], [CVE-2022-20422], [CVE-2022-2905], [CVE-2022-2978], [CVE-2022-3028], [CVE-2022-3625], [CVE-2022-3635], [CVE-2022-39190], [CVE-2022-40768] |
USN-5729-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:57251000000 |
false |
patch |
[USN-5725-1], [CVE-2020-16845] |
USN-5725-1 -- Go vulnerability |
| oval:com.ubuntu.jammy:def:57241000000 |
false |
patch |
[USN-5724-1], [CVE-2022-3266], [CVE-2022-40956], [CVE-2022-40957], [CVE-2022-40958], [CVE-2022-40959], [CVE-2022-40960], [CVE-2022-40962], [CVE-2022-39236], [CVE-2022-39249], [CVE-2022-39250], [CVE-2022-39251], [CVE-2022-42927], [CVE-2022-42928], [CVE-2022-42929], [CVE-2022-42932] |
USN-5724-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:57221000000 |
false |
patch |
[USN-5722-1], [CVE-2022-41741], [CVE-2022-41742] |
USN-5722-1 -- nginx vulnerabilities |
| oval:com.ubuntu.jammy:def:57191000000 |
false |
patch |
[USN-5719-1], [CVE-2022-21619], [CVE-2022-21624], [CVE-2022-21626], [CVE-2022-21628], [CVE-2022-39399], [CVE-2022-21618] |
USN-5719-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:57181000000 |
false |
patch |
[USN-5718-1], [CVE-2022-44638] |
USN-5718-1 -- pixman vulnerability |
| oval:com.ubuntu.jammy:def:57171000000 |
false |
patch |
[USN-5717-1], [CVE-2022-31628], [CVE-2022-31629], [CVE-2022-31630], [CVE-2022-37454] |
USN-5717-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:57161000000 |
false |
patch |
[USN-5716-1], [CVE-2022-35737] |
USN-5716-1 -- SQLite vulnerability |
| oval:com.ubuntu.jammy:def:57141000000 |
false |
patch |
[USN-5714-1], [CVE-2022-2519], [CVE-2022-2520], [CVE-2022-2521], [CVE-2022-2867], [CVE-2022-2868], [CVE-2022-2869], [CVE-2022-2953], [CVE-2022-34526], [CVE-2022-3570], [CVE-2022-3597], [CVE-2022-3598], [CVE-2022-3599], [CVE-2022-3626], [CVE-2022-3627] |
USN-5714-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:57131000000 |
false |
patch |
[USN-5713-1], [CVE-2022-42919] |
USN-5713-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:57111000000 |
false |
patch |
[USN-5711-1], [CVE-2022-40284] |
USN-5711-1 -- NTFS-3G vulnerability |
| oval:com.ubuntu.jammy:def:57101000000 |
false |
patch |
[USN-5710-1], [CVE-2022-3358], [CVE-2022-3602], [CVE-2022-3786] |
USN-5710-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:57081000000 |
false |
patch |
[USN-5708-1], [CVE-2022-41674], [CVE-2022-42719], [CVE-2022-42720], [CVE-2022-42721], [CVE-2022-42722] |
USN-5708-1 -- backport-iwlwifi-dkms vulnerabilities |
| oval:com.ubuntu.jammy:def:57041000000 |
false |
patch |
[USN-5704-1], [CVE-2022-42010], [CVE-2022-42011], [CVE-2022-42012] |
USN-5704-1 -- DBus vulnerabilities |
| oval:com.ubuntu.jammy:def:57031000000 |
false |
patch |
[USN-5703-1], [CVE-2022-1882], [CVE-2022-26373], [CVE-2022-3176], [CVE-2022-36879], [CVE-2022-39189] |
USN-5703-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:57021000000 |
false |
patch |
[USN-5702-1], [CVE-2022-32221], [CVE-2022-35260], [CVE-2022-42915], [CVE-2022-42916] |
USN-5702-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:56971000000 |
false |
patch |
[USN-5697-1], [CVE-2022-3100] |
USN-5697-1 -- Barbican vulnerability |
| oval:com.ubuntu.jammy:def:56961000000 |
false |
patch |
[USN-5696-1], [CVE-2022-21589], [CVE-2022-21592], [CVE-2022-21594], [CVE-2022-21599], [CVE-2022-21604], [CVE-2022-21608], [CVE-2022-21611], [CVE-2022-21617], [CVE-2022-21625], [CVE-2022-21632], [CVE-2022-21633], [CVE-2022-21637], [CVE-2022-21640], [CVE-2022-39400], [CVE-2022-39408], [CVE-2022-39410] |
USN-5696-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:56941000000 |
false |
patch |
[USN-5694-1], [CVE-2020-12801], [CVE-2020-12803], [CVE-2022-26305], [CVE-2022-26306], [CVE-2022-26307], [CVE-2022-3140] |
USN-5694-1 -- LibreOffice vulnerabilities |
| oval:com.ubuntu.jammy:def:56931000000 |
false |
patch |
[USN-5693-1], [CVE-2022-2318], [CVE-2022-2602], [CVE-2022-2978], [CVE-2022-3028], [CVE-2022-40768], [CVE-2022-41674], [CVE-2022-42719], [CVE-2022-42720], [CVE-2022-42721], [CVE-2022-42722] |
USN-5693-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:56921000000 |
false |
patch |
[USN-5692-1], [CVE-2022-2602], [CVE-2022-41674], [CVE-2022-42719], [CVE-2022-42720], [CVE-2022-42721], [CVE-2022-42722] |
USN-5692-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:56891000000 |
false |
patch |
[USN-5689-1], [CVE-2020-16156] |
USN-5689-1 -- Perl vulnerability |
| oval:com.ubuntu.jammy:def:56881000000 |
false |
patch |
[USN-5688-1], [CVE-2022-3515] |
USN-5688-1 -- Libksba vulnerability |
| oval:com.ubuntu.jammy:def:56861000000 |
false |
patch |
[USN-5686-1], [CVE-2022-39253], [CVE-2022-39260] |
USN-5686-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:56851000000 |
false |
patch |
[USN-5685-1], [CVE-2022-37032], [CVE-2022-37035] |
USN-5685-1 -- FRR vulnerabilities |
| oval:com.ubuntu.jammy:def:56831000000 |
false |
patch |
[USN-5683-1], [CVE-2021-33655], [CVE-2022-1882], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-26373], [CVE-2022-3176], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36879], [CVE-2022-36946], [CVE-2022-39189] |
USN-5683-1 -- Linux kernel (IBM) vulnerabilities |
| oval:com.ubuntu.jammy:def:56731000000 |
false |
patch |
[USN-5673-1], [CVE-2021-4217], [CVE-2022-0529], [CVE-2022-0530] |
USN-5673-1 -- unzip vulnerabilities |
| oval:com.ubuntu.jammy:def:56701000000 |
false |
patch |
[USN-5670-1], [CVE-2022-41032] |
USN-5670-1 -- .NET 6 vulnerability |
| oval:com.ubuntu.jammy:def:56671000000 |
false |
patch |
[USN-5667-1], [CVE-2022-1882], [CVE-2022-26373], [CVE-2022-3176], [CVE-2022-36879], [CVE-2022-39189] |
USN-5667-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:56631000000 |
false |
patch |
[USN-5663-1], [CVE-2022-2505], [CVE-2022-3032], [CVE-2022-3033], [CVE-2022-3034], [CVE-2022-36059], [CVE-2022-36318], [CVE-2022-36319], [CVE-2022-38472], [CVE-2022-38473], [CVE-2022-38476], [CVE-2022-38477], [CVE-2022-38478] |
USN-5663-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:56591000000 |
false |
patch |
[USN-5659-1], [CVE-2020-35605], [CVE-2022-41322] |
USN-5659-1 -- kitty vulnerabilities |
| oval:com.ubuntu.jammy:def:56581000000 |
false |
patch |
[USN-5658-1], [CVE-2022-2928], [CVE-2022-2929] |
USN-5658-1 -- DHCP vulnerabilities |
| oval:com.ubuntu.jammy:def:56551000000 |
false |
patch |
[USN-5655-1], [CVE-2021-33655], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36946] |
USN-5655-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:56531000000 |
false |
patch |
[USN-5653-1], [CVE-2022-41323] |
USN-5653-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:56511000000 |
false |
patch |
[USN-5651-1], [CVE-2022-40617] |
USN-5651-1 -- strongSwan vulnerability |
| oval:com.ubuntu.jammy:def:56431000000 |
false |
patch |
[USN-5643-1], [CVE-2020-27792], [CVE-2022-2085] |
USN-5643-1 -- Ghostscript vulnerabilities |
| oval:com.ubuntu.jammy:def:56421000000 |
false |
patch |
[USN-5642-1], [CVE-2022-32886] |
USN-5642-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:56411000000 |
false |
patch |
[USN-5641-1], [CVE-2022-41317], [CVE-2022-41318] |
USN-5641-1 -- Squid vulnerabilities |
| oval:com.ubuntu.jammy:def:56401000000 |
false |
patch |
[USN-5640-1], [CVE-2021-33655], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36946] |
USN-5640-1 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:56383000000 |
false |
patch |
[USN-5638-3], [CVE-2022-43680] |
USN-5638-3 -- Expat vulnerability |
| oval:com.ubuntu.jammy:def:56382000000 |
false |
patch |
[USN-5638-2], [CVE-2022-40674], [CVE-2022-43680] |
USN-5638-2 -- Expat vulnerabilities |
| oval:com.ubuntu.jammy:def:56361000000 |
false |
patch |
[USN-5636-1], [CVE-2022-2806] |
USN-5636-1 -- SoS vulnerability |
| oval:com.ubuntu.jammy:def:56351000000 |
false |
patch |
[USN-5635-1], [CVE-2021-33655], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36946] |
USN-5635-1 -- Linux kernel (GKE) vulnerabilities |
| oval:com.ubuntu.jammy:def:56341000000 |
false |
patch |
[USN-5634-1], [CVE-2022-36946] |
USN-5634-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:56331000000 |
false |
patch |
[USN-5633-1], [CVE-2021-33655], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36946] |
USN-5633-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:56321000000 |
false |
patch |
[USN-5632-1], [CVE-2022-36087] |
USN-5632-1 -- OAuthLib vulnerability |
| oval:com.ubuntu.jammy:def:56271000000 |
false |
patch |
[USN-5627-1], [CVE-2022-1586], [CVE-2022-1587] |
USN-5627-1 -- PCRE vulnerabilities |
| oval:com.ubuntu.jammy:def:56261000000 |
false |
patch |
[USN-5626-1], [CVE-2022-2795], [CVE-2022-2881], [CVE-2022-2906], [CVE-2022-3080], [CVE-2022-38177], [CVE-2022-38178] |
USN-5626-1 -- Bind vulnerabilities |
| oval:com.ubuntu.jammy:def:56251000000 |
false |
patch |
[USN-5625-1], [CVE-2022-40023] |
USN-5625-1 -- Mako vulnerability |
| oval:com.ubuntu.jammy:def:56241000000 |
false |
patch |
[USN-5624-1], [CVE-2021-33655], [CVE-2022-2318], [CVE-2022-26365], [CVE-2022-33740], [CVE-2022-33741], [CVE-2022-33742], [CVE-2022-33743], [CVE-2022-33744], [CVE-2022-34494], [CVE-2022-34495], [CVE-2022-36946] |
USN-5624-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:56201000000 |
false |
patch |
[USN-5620-1], [CVE-2021-20296], [CVE-2021-23215], [CVE-2021-26260], [CVE-2021-3598], [CVE-2021-3605], [CVE-2021-3933], [CVE-2021-3941] |
USN-5620-1 -- OpenEXR vulnerabilities |
| oval:com.ubuntu.jammy:def:56191000000 |
false |
patch |
[USN-5619-1], [CVE-2020-19131], [CVE-2020-19144], [CVE-2022-1354], [CVE-2022-1355], [CVE-2022-2056], [CVE-2022-2057], [CVE-2022-2058] |
USN-5619-1 -- LibTIFF vulnerabilities |
| oval:com.ubuntu.jammy:def:56161000000 |
false |
patch |
[USN-5616-1], [CVE-2021-33061], [CVE-2022-1012], [CVE-2022-1729], [CVE-2022-1852], [CVE-2022-1943], [CVE-2022-1973], [CVE-2022-2503], [CVE-2022-2873], [CVE-2022-2959], [CVE-2022-32296] |
USN-5616-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:56141000000 |
false |
patch |
[USN-5614-1], [CVE-2021-3782] |
USN-5614-1 -- Wayland vulnerability |
| oval:com.ubuntu.jammy:def:56131000000 |
false |
patch |
[USN-5613-1], [CVE-2022-0943], [CVE-2022-1154], [CVE-2022-1420], [CVE-2022-1616], [CVE-2022-1619], [CVE-2022-1620], [CVE-2022-1621] |
USN-5613-1 -- Vim vulnerabilities |
| oval:com.ubuntu.jammy:def:56121000000 |
false |
patch |
[USN-5612-1], [CVE-2022-21233] |
USN-5612-1 -- Intel Microcode vulnerability |
| oval:com.ubuntu.jammy:def:56111000000 |
false |
patch |
[USN-5611-1], [CVE-2022-32893] |
USN-5611-1 -- WebKitGTK vulnerability |
| oval:com.ubuntu.jammy:def:56101000000 |
false |
patch |
[USN-5610-1], [CVE-2022-24713] |
USN-5610-1 -- rust-regex vulnerability |
| oval:com.ubuntu.jammy:def:56091000000 |
false |
patch |
[USN-5609-1], [CVE-2022-38013] |
USN-5609-1 -- .NET 6 vulnerability |
| oval:com.ubuntu.jammy:def:56081000000 |
false |
patch |
[USN-5608-1], [CVE-2022-2132] |
USN-5608-1 -- DPDK vulnerability |
| oval:com.ubuntu.jammy:def:56071000000 |
false |
patch |
[USN-5607-1], [CVE-2021-44648] |
USN-5607-1 -- GDK-PixBuf vulnerability |
| oval:com.ubuntu.jammy:def:56061000000 |
false |
patch |
[USN-5606-1], [CVE-2022-38784] |
USN-5606-1 -- poppler vulnerability |
| oval:com.ubuntu.jammy:def:56021000000 |
false |
patch |
[USN-5602-1], [CVE-2021-33061], [CVE-2022-1012], [CVE-2022-1729], [CVE-2022-1852], [CVE-2022-1943], [CVE-2022-1973], [CVE-2022-2503], [CVE-2022-2873], [CVE-2022-2959] |
USN-5602-1 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:55991000000 |
false |
patch |
[USN-5599-1], [CVE-2021-33061], [CVE-2022-1012], [CVE-2022-1729], [CVE-2022-1852], [CVE-2022-1943], [CVE-2022-1973], [CVE-2022-2503], [CVE-2022-2873], [CVE-2022-2959] |
USN-5599-1 -- Linux kernel (Oracle) vulnerabilities |
| oval:com.ubuntu.jammy:def:55961000000 |
false |
patch |
[USN-5596-1], [CVE-2021-33061], [CVE-2021-33655] |
USN-5596-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:55941000000 |
false |
patch |
[USN-5594-1], [CVE-2021-33061], [CVE-2022-1012], [CVE-2022-1729], [CVE-2022-1852], [CVE-2022-1943], [CVE-2022-1973], [CVE-2022-2503], [CVE-2022-2873], [CVE-2022-2959] |
USN-5594-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:55871000000 |
false |
patch |
[USN-5587-1], [CVE-2022-35252] |
USN-5587-1 -- curl vulnerability |
| oval:com.ubuntu.jammy:def:55851000000 |
false |
patch |
[USN-5585-1], [CVE-2018-19351], [CVE-2018-21030], [CVE-2019-10255], [CVE-2019-10856], [CVE-2019-9644], [CVE-2020-26215], [CVE-2022-24758], [CVE-2022-29238] |
USN-5585-1 -- Jupyter Notebook vulnerabilities |
| oval:com.ubuntu.jammy:def:55841000000 |
false |
patch |
[USN-5584-1], [CVE-2022-2787] |
USN-5584-1 -- Schroot vulnerability |
| oval:com.ubuntu.jammy:def:55781000000 |
false |
patch |
[USN-5578-1], [CVE-2022-31676] |
USN-5578-1 -- Open VM Tools vulnerability |
| oval:com.ubuntu.jammy:def:55761000000 |
false |
patch |
[USN-5576-1], [CVE-2022-24801] |
USN-5576-1 -- Twisted vulnerability |
| oval:com.ubuntu.jammy:def:55751000000 |
false |
patch |
[USN-5575-1], [CVE-2019-5815], [CVE-2021-30560] |
USN-5575-1 -- Libxslt vulnerabilities |
| oval:com.ubuntu.jammy:def:55711000000 |
false |
patch |
[USN-5571-1], [CVE-2022-2625] |
USN-5571-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:55702000000 |
false |
patch |
[USN-5570-2], [CVE-2022-37434] |
USN-5570-2 -- zlib vulnerability |
| oval:com.ubuntu.jammy:def:55691000000 |
false |
patch |
[USN-5569-1], [CVE-2022-30698], [CVE-2022-30699] |
USN-5569-1 -- Unbound vulnerabilities |
| oval:com.ubuntu.jammy:def:55681000000 |
false |
patch |
[USN-5568-1], [CVE-2022-2294], [CVE-2022-32792], [CVE-2022-32816] |
USN-5568-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:55671000000 |
false |
patch |
[USN-5567-1], [CVE-2022-2585], [CVE-2022-2586], [CVE-2022-2588] |
USN-5567-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:55661000000 |
false |
patch |
[USN-5566-1], [CVE-2022-1652], [CVE-2022-1679], [CVE-2022-2585], [CVE-2022-2586], [CVE-2022-2588], [CVE-2022-28893], [CVE-2022-29900], [CVE-2022-29901], [CVE-2022-34918] |
USN-5566-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:55651000000 |
false |
patch |
[USN-5565-1], [CVE-2022-2585], [CVE-2022-2586], [CVE-2022-2588], [CVE-2022-29900], [CVE-2022-29901] |
USN-5565-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:55641000000 |
false |
patch |
[USN-5564-1], [CVE-2022-0500], [CVE-2022-1652], [CVE-2022-1679], [CVE-2022-1734], [CVE-2022-1789], [CVE-2022-1974], [CVE-2022-1975], [CVE-2022-2585], [CVE-2022-2586], [CVE-2022-2588], [CVE-2022-28893], [CVE-2022-29900], [CVE-2022-29901], [CVE-2022-33981], [CVE-2022-34918] |
USN-5564-1 -- Linux kernel (Intel IoTG) vulnerabilities |
| oval:com.ubuntu.jammy:def:55611000000 |
false |
patch |
[USN-5561-1], [CVE-2021-45085], [CVE-2021-45086], [CVE-2021-45087], [CVE-2022-29536] |
USN-5561-1 -- GNOME Web vulnerabilities |
| oval:com.ubuntu.jammy:def:55591000000 |
false |
patch |
[USN-5559-1], [CVE-2022-24785], [CVE-2022-31129] |
USN-5559-1 -- Moment.js vulnerabilities |
| oval:com.ubuntu.jammy:def:55561000000 |
false |
patch |
[USN-5556-1], [CVE-2022-2553] |
USN-5556-1 -- Booth vulnerability |
| oval:com.ubuntu.jammy:def:55511000000 |
false |
patch |
[USN-5551-1], [CVE-2022-2255] |
USN-5551-1 -- mod-wsgi vulnerability |
| oval:com.ubuntu.jammy:def:55501000000 |
false |
patch |
[USN-5550-1], [CVE-2021-4209], [CVE-2022-2509] |
USN-5550-1 -- GnuTLS vulnerabilities |
| oval:com.ubuntu.jammy:def:55491000000 |
false |
patch |
[USN-5549-1], [CVE-2022-36359] |
USN-5549-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:55471000000 |
false |
patch |
[USN-5547-1], [CVE-2022-31607], [CVE-2022-31608], [CVE-2022-31615] |
USN-5547-1 -- NVIDIA graphics drivers vulnerabilities |
| oval:com.ubuntu.jammy:def:55461000000 |
false |
patch |
[USN-5546-1], [CVE-2022-21426], [CVE-2022-21434], [CVE-2022-21443], [CVE-2022-21449], [CVE-2022-21476], [CVE-2022-21496], [CVE-2022-21540], [CVE-2022-21541], [CVE-2022-21549], [CVE-2022-34169] |
USN-5546-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:55451000000 |
false |
patch |
[USN-5545-1], [CVE-2022-34918] |
USN-5545-1 -- Linux kernel (OEM) vulnerability |
| oval:com.ubuntu.jammy:def:55441000000 |
false |
patch |
[USN-5544-1], [CVE-2022-1652], [CVE-2022-1679], [CVE-2022-28893], [CVE-2022-34918] |
USN-5544-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:55431000000 |
false |
patch |
[USN-5543-1], [CVE-2022-24805], [CVE-2022-24806], [CVE-2022-24807], [CVE-2022-24808], [CVE-2022-24809], [CVE-2022-24810] |
USN-5543-1 -- Net-SNMP vulnerabilities |
| oval:com.ubuntu.jammy:def:55421000000 |
false |
patch |
[USN-5542-1], [CVE-2021-3670], [CVE-2022-2031], [CVE-2022-32742], [CVE-2022-32744], [CVE-2022-32745], [CVE-2022-32746] |
USN-5542-1 -- Samba vulnerabilities |
| oval:com.ubuntu.jammy:def:55381000000 |
false |
patch |
[USN-5538-1], [CVE-2021-46828] |
USN-5538-1 -- libtirpc vulnerability |
| oval:com.ubuntu.jammy:def:55371000000 |
false |
patch |
[USN-5537-1], [CVE-2022-21509], [CVE-2022-21515], [CVE-2022-21517], [CVE-2022-21522], [CVE-2022-21525], [CVE-2022-21526], [CVE-2022-21527], [CVE-2022-21528], [CVE-2022-21529], [CVE-2022-21530], [CVE-2022-21531], [CVE-2022-21534], [CVE-2022-21537], [CVE-2022-21538], [CVE-2022-21539], [CVE-2022-21547], [CVE-2022-21553], [CVE-2022-21569] |
USN-5537-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:55321000000 |
false |
patch |
[USN-5532-1], [CVE-2022-31799] |
USN-5532-1 -- Bottle vulnerability |
| oval:com.ubuntu.jammy:def:55311000000 |
false |
patch |
[USN-5531-1], [CVE-2022-33070] |
USN-5531-1 -- protobuf-c vulnerability |
| oval:com.ubuntu.jammy:def:55301000000 |
false |
patch |
[USN-5530-1], [CVE-2022-31627] |
USN-5530-1 -- PHP vulnerability |
| oval:com.ubuntu.jammy:def:55291000000 |
false |
patch |
[USN-5529-1], [CVE-2022-1652], [CVE-2022-1679], [CVE-2022-1789], [CVE-2022-1852], [CVE-2022-1973], [CVE-2022-2078], [CVE-2022-21123], [CVE-2022-21125], [CVE-2022-21166], [CVE-2022-34494], [CVE-2022-34495] |
USN-5529-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:55281000000 |
false |
patch |
[USN-5528-1], [CVE-2022-27404], [CVE-2022-27405], [CVE-2022-27406], [CVE-2022-31782] |
USN-5528-1 -- FreeType vulnerabilities |
| oval:com.ubuntu.jammy:def:55262000000 |
false |
patch |
[USN-5526-2] |
USN-5526-2 -- PyJWT regression |
| oval:com.ubuntu.jammy:def:55261000000 |
false |
patch |
[USN-5526-1], [CVE-2022-29217] |
USN-5526-1 -- PyJWT vulnerability |
| oval:com.ubuntu.jammy:def:55241000000 |
false |
patch |
[USN-5524-1], [CVE-2022-33068] |
USN-5524-1 -- HarfBuzz vulnerability |
| oval:com.ubuntu.jammy:def:55221000000 |
false |
patch |
[USN-5522-1], [CVE-2022-22677], [CVE-2022-26710] |
USN-5522-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:55201000000 |
false |
patch |
[USN-5520-1], [CVE-2022-31081] |
USN-5520-1 -- HTTP-Daemon vulnerability |
| oval:com.ubuntu.jammy:def:55191000000 |
false |
patch |
[USN-5519-1], [CVE-2015-20107] |
USN-5519-1 -- Python vulnerability |
| oval:com.ubuntu.jammy:def:55181000000 |
false |
patch |
[USN-5518-1], [CVE-2022-0500], [CVE-2022-1734], [CVE-2022-1789], [CVE-2022-1974], [CVE-2022-1975], [CVE-2022-33981] |
USN-5518-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:55121000000 |
false |
patch |
[USN-5512-1], [CVE-2022-1834], [CVE-2022-31736], [CVE-2022-31737], [CVE-2022-31738], [CVE-2022-31740], [CVE-2022-31741], [CVE-2022-31742], [CVE-2022-31747], [CVE-2022-2200], [CVE-2022-31744], [CVE-2022-34468], [CVE-2022-34470], [CVE-2022-34472], [CVE-2022-34479], [CVE-2022-34481], [CVE-2022-34484], [CVE-2022-2226] |
USN-5512-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:55111000000 |
false |
patch |
[USN-5511-1], [CVE-2022-29187] |
USN-5511-1 -- Git vulnerabilities |
| oval:com.ubuntu.jammy:def:55101000000 |
false |
patch |
[USN-5510-1], [CVE-2022-2319], [CVE-2022-2320] |
USN-5510-1 -- X.Org X Server vulnerabilities |
| oval:com.ubuntu.jammy:def:55091000000 |
false |
patch |
[USN-5509-1], [CVE-2022-30550] |
USN-5509-1 -- Dovecot vulnerability |
| oval:com.ubuntu.jammy:def:55081000000 |
false |
patch |
[USN-5508-1], [CVE-2021-46823] |
USN-5508-1 -- Python LDAP vulnerability |
| oval:com.ubuntu.jammy:def:55061000000 |
false |
patch |
[USN-5506-1], [CVE-2022-22747], [CVE-2022-34480] |
USN-5506-1 -- NSS vulnerabilities |
| oval:com.ubuntu.jammy:def:55031000000 |
false |
patch |
[USN-5503-1], [CVE-2022-34903] |
USN-5503-1 -- GnuPG vulnerability |
| oval:com.ubuntu.jammy:def:55021000000 |
false |
patch |
[USN-5502-1], [CVE-2022-2097] |
USN-5502-1 -- OpenSSL vulnerability |
| oval:com.ubuntu.jammy:def:55011000000 |
false |
patch |
[USN-5501-1], [CVE-2022-34265] |
USN-5501-1 -- Django vulnerability |
| oval:com.ubuntu.jammy:def:54961000000 |
false |
patch |
[USN-5496-1], [CVE-2022-2084] |
USN-5496-1 -- cloud-init vulnerability |
| oval:com.ubuntu.jammy:def:54952000000 |
false |
patch |
[USN-5495-2] |
USN-5495-2 -- curl regression |
| oval:com.ubuntu.jammy:def:54951000000 |
false |
patch |
[USN-5495-1], [CVE-2022-32205], [CVE-2022-32206], [CVE-2022-32207], [CVE-2022-32208] |
USN-5495-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:54941000000 |
false |
patch |
[USN-5494-1], [CVE-2022-28285], [CVE-2022-31740] |
USN-5494-1 -- SpiderMonkey JavaScript Library vulnerabilities |
| oval:com.ubuntu.jammy:def:54911000000 |
false |
patch |
[USN-5491-1], [CVE-2021-46784] |
USN-5491-1 -- Squid vulnerability |
| oval:com.ubuntu.jammy:def:54891000000 |
false |
patch |
[USN-5489-1], [CVE-2021-3507], [CVE-2021-3929], [CVE-2021-4206], [CVE-2021-4207], [CVE-2022-0358], [CVE-2022-26353], [CVE-2022-26354] |
USN-5489-1 -- QEMU vulnerabilities |
| oval:com.ubuntu.jammy:def:54881000000 |
false |
patch |
[USN-5488-1], [CVE-2022-2068] |
USN-5488-1 -- OpenSSL vulnerability |
| oval:com.ubuntu.jammy:def:54871000000 |
false |
patch |
[USN-5487-1], [CVE-2022-26377], [CVE-2022-28614], [CVE-2022-28615], [CVE-2022-29404], [CVE-2022-30522], [CVE-2022-30556], [CVE-2022-31813] |
USN-5487-1 -- Apache HTTP Server vulnerabilities |
| oval:com.ubuntu.jammy:def:54861000000 |
false |
patch |
[USN-5486-1], [CVE-2021-0127], [CVE-2021-0145], [CVE-2021-0146], [CVE-2021-33117], [CVE-2021-33120], [CVE-2022-21123], [CVE-2022-21127], [CVE-2022-21151], [CVE-2022-21166] |
USN-5486-1 -- Intel Microcode vulnerabilities |
| oval:com.ubuntu.jammy:def:54851000000 |
false |
patch |
[USN-5485-1], [CVE-2022-21123], [CVE-2022-21125], [CVE-2022-21166] |
USN-5485-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:54831000000 |
false |
patch |
[USN-5483-1], [CVE-2018-12648], [CVE-2021-36045], [CVE-2021-36046], [CVE-2021-36047], [CVE-2021-36048], [CVE-2021-36050], [CVE-2021-36051], [CVE-2021-36052], [CVE-2021-36053], [CVE-2021-36054], [CVE-2021-36055], [CVE-2021-36056], [CVE-2021-36058], [CVE-2021-36064], [CVE-2021-39847], [CVE-2021-40716], [CVE-2021-40732], [CVE-2021-42528], [CVE-2021-42529], [CVE-2021-42530], [CVE-2021-42531], [CVE-2021-42532] |
USN-5483-1 -- Exempi vulnerabilities |
| oval:com.ubuntu.jammy:def:54791000000 |
false |
patch |
[USN-5479-1], [CVE-2022-31625], [CVE-2022-31626] |
USN-5479-1 -- PHP vulnerabilities |
| oval:com.ubuntu.jammy:def:54761000000 |
false |
patch |
[USN-5476-1], [CVE-2022-26981], [CVE-2022-31783] |
USN-5476-1 -- Liblouis vulnerabilities |
| oval:com.ubuntu.jammy:def:54741000000 |
false |
patch |
[USN-5474-1], [CVE-2019-20637], [CVE-2020-11653], [CVE-2021-36740], [CVE-2022-23959] |
USN-5474-1 -- Varnish Cache vulnerabilities |
| oval:com.ubuntu.jammy:def:54721000000 |
false |
patch |
[USN-5472-1], [CVE-2020-20445], [CVE-2020-20446], [CVE-2020-20450], [CVE-2020-20453], [CVE-2020-21041], [CVE-2020-21688], [CVE-2020-21697], [CVE-2020-22015], [CVE-2020-22016], [CVE-2020-22017], [CVE-2020-22019], [CVE-2020-22020], [CVE-2020-22021], [CVE-2020-22022], [CVE-2020-22023], [CVE-2020-22025], [CVE-2020-22026], [CVE-2020-22027], [CVE-2020-22028], [CVE-2020-22029], [CVE-2020-22030], [CVE-2020-22031], [CVE-2020-22032], [CVE-2020-22033], [CVE-2020-22034], [CVE-2020-22035], [CVE-2020-22036], [CVE-2020-22037], [CVE-2020-22042], [CVE-2020-35965], [CVE-2021-38114], [CVE-2021-38171], [CVE-2021-38291], [CVE-2022-1475] |
USN-5472-1 -- FFmpeg vulnerabilities |
| oval:com.ubuntu.jammy:def:54711000000 |
false |
patch |
[USN-5471-1], [CVE-2022-1012], [CVE-2022-1205], [CVE-2022-1734], [CVE-2022-1836], [CVE-2022-1966], [CVE-2022-1972], [CVE-2022-21499], [CVE-2022-29968] |
USN-5471-1 -- Linux kernel (OEM) vulnerabilities |
| oval:com.ubuntu.jammy:def:54691000000 |
false |
patch |
[USN-5469-1], [CVE-2022-0168], [CVE-2022-1048], [CVE-2022-1158], [CVE-2022-1195], [CVE-2022-1198], [CVE-2022-1199], [CVE-2022-1204], [CVE-2022-1205], [CVE-2022-1263], [CVE-2022-1353], [CVE-2022-1516], [CVE-2022-1651], [CVE-2022-1671], [CVE-2022-1966], [CVE-2022-1972], [CVE-2022-21499], [CVE-2022-28356], [CVE-2022-28388], [CVE-2022-28389], [CVE-2022-28390] |
USN-5469-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:54641000000 |
false |
patch |
[USN-5464-1], [CVE-2022-1304] |
USN-5464-1 -- e2fsprogs vulnerability |
| oval:com.ubuntu.jammy:def:54631000000 |
false |
patch |
[USN-5463-1], [CVE-2021-46790], [CVE-2022-30783], [CVE-2022-30784], [CVE-2022-30785], [CVE-2022-30786], [CVE-2022-30787], [CVE-2022-30788], [CVE-2022-30789] |
USN-5463-1 -- NTFS-3G vulnerabilities |
| oval:com.ubuntu.jammy:def:54621000000 |
false |
patch |
[USN-5462-1], [CVE-2022-28738], [CVE-2022-28739] |
USN-5462-1 -- Ruby vulnerabilities |
| oval:com.ubuntu.jammy:def:54611000000 |
false |
patch |
[USN-5461-1], [CVE-2022-24882], [CVE-2022-24883] |
USN-5461-1 -- FreeRDP vulnerabilities |
| oval:com.ubuntu.jammy:def:54591000000 |
false |
patch |
[USN-5459-1], [CVE-2020-14342], [CVE-2021-20208], [CVE-2022-27239], [CVE-2022-29869] |
USN-5459-1 -- cifs-utils vulnerabilities |
| oval:com.ubuntu.jammy:def:54571000000 |
false |
patch |
[USN-5457-1], [CVE-2022-26700], [CVE-2022-26709], [CVE-2022-26716], [CVE-2022-26717], [CVE-2022-26719] |
USN-5457-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:54551000000 |
false |
patch |
[USN-5455-1], [CVE-2012-1148], [CVE-2015-1283], [CVE-2016-0718], [CVE-2016-4472], [CVE-2018-20843], [CVE-2019-15903], [CVE-2021-46143], [CVE-2022-22822], [CVE-2022-22823], [CVE-2022-22824], [CVE-2022-22825], [CVE-2022-22826], [CVE-2022-22827], [CVE-2022-25235], [CVE-2022-25236] |
USN-5455-1 -- xmltok library vulnerabilities |
| oval:com.ubuntu.jammy:def:54541000000 |
false |
patch |
[USN-5454-1], [CVE-2019-8842], [CVE-2020-10001], [CVE-2022-26691] |
USN-5454-1 -- CUPS vulnerabilities |
| oval:com.ubuntu.jammy:def:54501000000 |
false |
patch |
[USN-5450-1], [CVE-2021-28544], [CVE-2022-24070] |
USN-5450-1 -- Subversion vulnerabilities |
| oval:com.ubuntu.jammy:def:54471000000 |
false |
patch |
[USN-5447-1], [CVE-2022-1348] |
USN-5447-1 -- logrotate vulnerability |
| oval:com.ubuntu.jammy:def:54461000000 |
false |
patch |
[USN-5446-1], [CVE-2022-1664] |
USN-5446-1 -- dpkg vulnerability |
| oval:com.ubuntu.jammy:def:54441000000 |
false |
patch |
[USN-5444-1], [CVE-2022-29581] |
USN-5444-1 -- Linux kernel vulnerability |
| oval:com.ubuntu.jammy:def:54431000000 |
false |
patch |
[USN-5443-1], [CVE-2022-29581], [CVE-2022-30594] |
USN-5443-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:54411000000 |
false |
patch |
[USN-5441-1] |
USN-5441-1 -- WebKitGTK vulnerabilities |
| oval:com.ubuntu.jammy:def:54401000000 |
false |
patch |
[USN-5440-1], [CVE-2022-1552] |
USN-5440-1 -- PostgreSQL vulnerability |
| oval:com.ubuntu.jammy:def:54391000000 |
false |
patch |
[USN-5439-1], [CVE-2022-1804] |
USN-5439-1 -- AccountsService vulnerability |
| oval:com.ubuntu.jammy:def:54351000000 |
false |
patch |
[USN-5435-1], [CVE-2022-1520], [CVE-2022-1529], [CVE-2022-1802], [CVE-2022-29909], [CVE-2022-29911], [CVE-2022-29912], [CVE-2022-29913], [CVE-2022-29914], [CVE-2022-29916], [CVE-2022-29917] |
USN-5435-1 -- Thunderbird vulnerabilities |
| oval:com.ubuntu.jammy:def:54301000000 |
false |
patch |
[USN-5430-1], [CVE-2022-1736] |
USN-5430-1 -- GNOME Settings vulnerability |
| oval:com.ubuntu.jammy:def:54291000000 |
false |
patch |
[USN-5429-1], [CVE-2022-1183] |
USN-5429-1 -- Bind vulnerability |
| oval:com.ubuntu.jammy:def:54271000000 |
false |
patch |
[USN-5427-1], [CVE-2021-3899], [CVE-2022-1242], [CVE-2022-28652], [CVE-2022-28654], [CVE-2022-28655], [CVE-2022-28656], [CVE-2022-28657], [CVE-2022-28658] |
USN-5427-1 -- Apport vulnerabilities |
| oval:com.ubuntu.jammy:def:54261000000 |
false |
patch |
[USN-5426-1], [CVE-2022-30688] |
USN-5426-1 -- needrestart vulnerability |
| oval:com.ubuntu.jammy:def:54251000000 |
false |
patch |
[USN-5425-1], [CVE-2019-20838], [CVE-2020-14155] |
USN-5425-1 -- PCRE vulnerabilities |
| oval:com.ubuntu.jammy:def:54241000000 |
false |
patch |
[USN-5424-1], [CVE-2022-29155] |
USN-5424-1 -- OpenLDAP vulnerability |
| oval:com.ubuntu.jammy:def:54231000000 |
false |
patch |
[USN-5423-1], [CVE-2022-20770], [CVE-2022-20771], [CVE-2022-20785], [CVE-2022-20792], [CVE-2022-20796] |
USN-5423-1 -- ClamAV vulnerabilities |
| oval:com.ubuntu.jammy:def:54221000000 |
false |
patch |
[USN-5422-1], [CVE-2022-23308], [CVE-2022-29824] |
USN-5422-1 -- libxml2 vulnerabilities |
| oval:com.ubuntu.jammy:def:54121000000 |
false |
patch |
[USN-5412-1], [CVE-2022-27780], [CVE-2022-27781], [CVE-2022-27782] |
USN-5412-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:54081000000 |
false |
patch |
[USN-5408-1], [CVE-2022-0934] |
USN-5408-1 -- Dnsmasq vulnerability |
| oval:com.ubuntu.jammy:def:54041000000 |
false |
patch |
[USN-5404-1], [CVE-2022-24903] |
USN-5404-1 -- Rsyslog vulnerability |
| oval:com.ubuntu.jammy:def:54021000000 |
false |
patch |
[USN-5402-1], [CVE-2022-1292], [CVE-2022-1343], [CVE-2022-1434], [CVE-2022-1473] |
USN-5402-1 -- OpenSSL vulnerabilities |
| oval:com.ubuntu.jammy:def:54011000000 |
false |
patch |
[USN-5401-1], [CVE-2021-3839], [CVE-2022-0669] |
USN-5401-1 -- DPDK vulnerabilities |
| oval:com.ubuntu.jammy:def:54003000000 |
false |
patch |
[USN-5400-3] |
USN-5400-3 -- MySQL regression |
| oval:com.ubuntu.jammy:def:54001000000 |
false |
patch |
[USN-5400-1], [CVE-2022-21412], [CVE-2022-21413], [CVE-2022-21414], [CVE-2022-21415], [CVE-2022-21417], [CVE-2022-21418], [CVE-2022-21423], [CVE-2022-21425], [CVE-2022-21427], [CVE-2022-21435], [CVE-2022-21436], [CVE-2022-21437], [CVE-2022-21438], [CVE-2022-21440], [CVE-2022-21444], [CVE-2022-21451], [CVE-2022-21452], [CVE-2022-21454], [CVE-2022-21457], [CVE-2022-21459], [CVE-2022-21460], [CVE-2022-21462], [CVE-2022-21478] |
USN-5400-1 -- MySQL vulnerabilities |
| oval:com.ubuntu.jammy:def:53971000000 |
false |
patch |
[USN-5397-1], [CVE-2022-22576], [CVE-2022-27774], [CVE-2022-27775], [CVE-2022-27776] |
USN-5397-1 -- curl vulnerabilities |
| oval:com.ubuntu.jammy:def:53952000000 |
false |
patch |
[USN-5395-2] |
USN-5395-2 -- networkd-dispatcher regression |
| oval:com.ubuntu.jammy:def:53951000000 |
false |
patch |
[USN-5395-1], [CVE-2022-29799], [CVE-2022-29800] |
USN-5395-1 -- networkd-dispatcher vulnerabilities |
| oval:com.ubuntu.jammy:def:53921000000 |
false |
patch |
[USN-5392-1], [CVE-2021-32055], [CVE-2022-1328] |
USN-5392-1 -- Mutt vulnerabilities |
| oval:com.ubuntu.jammy:def:53902000000 |
false |
patch |
[USN-5390-2], [CVE-2022-1015], [CVE-2022-1016], [CVE-2022-26490] |
USN-5390-2 -- Linux kernel (Raspberry Pi) vulnerabilities |
| oval:com.ubuntu.jammy:def:53901000000 |
false |
patch |
[USN-5390-1], [CVE-2022-1015], [CVE-2022-1016], [CVE-2022-26490] |
USN-5390-1 -- Linux kernel vulnerabilities |
| oval:com.ubuntu.jammy:def:53882000000 |
false |
patch |
[USN-5388-2], [CVE-2022-21426], [CVE-2022-21434], [CVE-2022-21443], [CVE-2022-21449], [CVE-2022-21476], [CVE-2022-21496] |
USN-5388-2 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:53881000000 |
false |
patch |
[USN-5388-1], [CVE-2022-21426], [CVE-2022-21434], [CVE-2022-21443], [CVE-2022-21476], [CVE-2022-21496] |
USN-5388-1 -- OpenJDK vulnerabilities |
| oval:com.ubuntu.jammy:def:53822000000 |
false |
patch |
[USN-5382-2], [CVE-2022-1215] |
USN-5382-2 -- libinput vulnerability |
| oval:com.ubuntu.jammy:def:53763000000 |
false |
patch |
[USN-5376-3] |
USN-5376-3 -- Git regression |
| oval:com.ubuntu.jammy:def:53762000000 |
false |
patch |
[USN-5376-2], [CVE-2022-24765] |
USN-5376-2 -- Git vulnerability |
| oval:com.ubuntu.jammy:def:53712000000 |
false |
patch |
[USN-5371-2], [CVE-2021-3618] |
USN-5371-2 -- nginx vulnerability |
| oval:com.ubuntu.jammy:def:53671000000 |
false |
patch |
[USN-5367-1], [CVE-2022-20001] |
USN-5367-1 -- fish vulnerability |
| oval:com.ubuntu.jammy:def:53662000000 |
false |
patch |
[USN-5366-2], [CVE-2022-25308], [CVE-2022-25309], [CVE-2022-25310] |
USN-5366-2 -- FriBidi vulnerabilities |
| oval:com.ubuntu.jammy:def:53542000000 |
false |
patch |
[USN-5354-2], [CVE-2022-21716] |
USN-5354-2 -- Twisted vulnerability |
| oval:com.ubuntu.jammy:def:53422000000 |
false |
patch |
[USN-5342-2], [CVE-2021-4189], [CVE-2022-0391] |
USN-5342-2 -- Python vulnerabilities |
| oval:com.ubuntu.jammy:def:53151000000 |
false |
patch |
[USN-5315-1], [CVE-2020-10744], [CVE-2020-1733], [CVE-2021-3583], [CVE-2021-3620] |
USN-5315-1 -- Ansible vulnerabilities |
| oval:com.ubuntu.jammy:def:52821000000 |
false |
patch |
[USN-5282-1], [CVE-2019-14267], [CVE-2019-14934], [CVE-2020-20740], [CVE-2020-9549], [CVE-2021-3508] |
USN-5282-1 -- PDFResurrect vulnerabilities |
| oval:com.ubuntu.jammy:def:52572000000 |
false |
patch |
[USN-5257-2], [CVE-2020-19860], [CVE-2020-19861] |
USN-5257-2 -- ldns vulnerabilities |
| oval:com.ubuntu.jammy:def:52451000000 |
false |
patch |
[USN-5245-1], [CVE-2021-26291] |
USN-5245-1 -- Apache Maven vulnerability |
| oval:com.ubuntu.jammy:def:52051000000 |
false |
patch |
[USN-5205-1], [CVE-2018-13112], [CVE-2018-17974], [CVE-2018-18407], [CVE-2018-18408], [CVE-2018-17580], [CVE-2018-17582], [CVE-2018-20552], [CVE-2018-20553], [CVE-2020-12740], [CVE-2020-24265], [CVE-2020-24266], [CVE-2022-27416], [CVE-2022-28487] |
USN-5205-1 -- Tcpreplay vulnerabilities |
| oval:com.ubuntu.jammy:def:51821000000 |
false |
patch |
[USN-5182-1], [CVE-2020-12625], [CVE-2020-12626], [CVE-2020-12640], [CVE-2020-12641], [CVE-2020-13964], [CVE-2020-13965], [CVE-2020-15562], [CVE-2020-16145], [CVE-2020-35730], [CVE-2021-44025], [CVE-2021-44026], [CVE-2021-46144] |
USN-5182-1 -- Roundcube Webmail vulnerabilities |
| oval:com.ubuntu.jammy:def:51811000000 |
false |
patch |
[USN-5181-1], [CVE-2021-41184], [CVE-2022-31160] |
USN-5181-1 -- jQuery UI vulnerability |
| oval:com.ubuntu.jammy:def:1151000000 |
false |
patch |
[LSN-0115-1], [CVE-2024-47685], [CVE-2024-50047], [CVE-2025-21887], [CVE-2024-27407], [CVE-2025-22088] |
LSN-0115-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1141000000 |
false |
patch |
[LSN-0114-1], [CVE-2022-49176], [CVE-2023-52885], [CVE-2022-49179], [CVE-2024-53197], [CVE-2025-21887], [CVE-2024-49883], [CVE-2025-22088], [CVE-2022-49909] |
LSN-0114-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1131000000 |
false |
patch |
[LSN-0113-1], [CVE-2024-57850], [CVE-2024-56596], [CVE-2024-50047], [CVE-2024-56551], [CVE-2024-53171], [CVE-2024-56608] |
LSN-0113-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1121000000 |
false |
patch |
[LSN-0112-1], [CVE-2022-0995], [CVE-2024-53168], [CVE-2024-56551], [CVE-2024-56598], [CVE-2024-35864], [CVE-2024-56653], [CVE-2024-53063], [CVE-2021-47506], [CVE-2024-53150], [CVE-2024-53197], [CVE-2024-56593], [CVE-2024-50302], [CVE-2024-57798], [CVE-2024-56595], [CVE-2023-52664], [CVE-2024-26689] |
LSN-0112-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1111000000 |
false |
patch |
[LSN-0111-1], [CVE-2024-50302], [CVE-2024-26928], [CVE-2024-53063], [CVE-2024-35864], [CVE-2024-56595], [CVE-2024-57798], [CVE-2024-56672], [CVE-2022-0995] |
LSN-0111-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1101000000 |
false |
patch |
[LSN-0110-1], [CVE-2024-53140], [CVE-2023-52880], [CVE-2024-53104], [CVE-2024-56672], [CVE-2025-0927], [CVE-2024-38558] |
LSN-0110-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1091000000 |
false |
patch |
[LSN-0109-1], [CVE-2024-26921], [CVE-2024-38630], [CVE-2024-43882], [CVE-2024-50264], [CVE-2024-26800], [CVE-2024-53103] |
LSN-0109-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1081000000 |
false |
patch |
[LSN-0108-1], [CVE-2024-26960], [CVE-2024-26800], [CVE-2024-27398], [CVE-2024-50264], [CVE-2024-26921], [CVE-2024-43882], [CVE-2024-38630] |
LSN-0108-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1071000000 |
false |
patch |
[LSN-0107-1], [CVE-2024-38630], [CVE-2024-27398], [CVE-2024-26923], [CVE-2024-26960], [CVE-2024-26921] |
LSN-0107-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1061000000 |
false |
patch |
[LSN-0106-1], [CVE-2024-36016], [CVE-2024-26585], [CVE-2023-52620] |
LSN-0106-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1051000000 |
false |
patch |
[LSN-0105-1], [CVE-2023-7192], [CVE-2024-26642], [CVE-2023-6270], [CVE-2024-26828], [CVE-2024-26924] |
LSN-0105-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1041000000 |
false |
patch |
[LSN-0104-1], [CVE-2023-6270], [CVE-2023-51781], [CVE-2024-26597], [CVE-2024-26581] |
LSN-0104-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1031000000 |
false |
patch |
[LSN-0103-1], [CVE-2024-0193], [CVE-2024-26597], [CVE-2023-51781], [CVE-2023-6817], [CVE-2023-4569], [CVE-2024-1085], [CVE-2024-1086] |
LSN-0103-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1021000000 |
false |
patch |
[LSN-0102-1], [CVE-2023-6176], [CVE-2023-4569], [CVE-2024-0646], [CVE-2024-1086], [CVE-2023-51781], [CVE-2023-1872] |
LSN-0102-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1011000000 |
false |
patch |
[LSN-0101-1], [CVE-2023-6817], [CVE-2023-6932], [CVE-2023-7192], [CVE-2024-0193], [CVE-2024-0646] |
LSN-0101-1 -- Kernel Live Patch Security Notice |
| oval:com.ubuntu.jammy:def:1001000000 |
false |
patch |
[LSN-0100-1], [CVE-2023-6817], [CVE-2023-6040], [CVE-2023-6932], [CVE-2023-6176], [CVE-2023-5345] |
LSN-0100-1 -- Kernel Live Patch Security Notice |